Action not permitted
Modal body text goes here.
cve-2021-30483
Vulnerability from cvelistv5
Published
2021-07-27 18:21
Modified
2024-08-03 22:32
Severity ?
EPSS score ?
Summary
isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/isomorphic-git/isomorphic-git/pull/1339 | Exploit, Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2 | Release Notes, Third Party Advisory | |
cve@mitre.org | https://vuln.ryotak.me/advisories/28 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:32:41.125Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuln.ryotak.me/advisories/28" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/isomorphic-git/isomorphic-git/pull/1339" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-27T18:21:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://vuln.ryotak.me/advisories/28" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/isomorphic-git/isomorphic-git/pull/1339" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://vuln.ryotak.me/advisories/28", "refsource": "MISC", "url": "https://vuln.ryotak.me/advisories/28" }, { "name": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2", "refsource": "MISC", "url": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2" }, { "name": "https://github.com/isomorphic-git/isomorphic-git/pull/1339", "refsource": "MISC", "url": "https://github.com/isomorphic-git/isomorphic-git/pull/1339" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30483", "datePublished": "2021-07-27T18:21:30", "dateReserved": "2021-04-10T00:00:00", "dateUpdated": "2024-08-03T22:32:41.125Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-30483\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-07-30T14:15:16.457\",\"lastModified\":\"2021-08-03T23:49:56.497\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.\"},{\"lang\":\"es\",\"value\":\"isomorphic-git versiones anteriores a 1.8.2, permite un Salto de Directorio por medio de un repositorio dise\u00f1ado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isomorphic-git:isomorphic-git:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.8.2\",\"matchCriteriaId\":\"67586BAC-855E-4D67-935A-4B7ED3DFC1F5\"}]}]}],\"references\":[{\"url\":\"https://github.com/isomorphic-git/isomorphic-git/pull/1339\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://vuln.ryotak.me/advisories/28\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2021-30483
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-30483", "description": "isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.", "id": "GSD-2021-30483", "references": [ "https://access.redhat.com/errata/RHSA-2023:0074" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-30483" ], "details": "isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.", "id": "GSD-2021-30483", "modified": "2023-12-13T01:23:30.572107Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://vuln.ryotak.me/advisories/28", "refsource": "MISC", "url": "https://vuln.ryotak.me/advisories/28" }, { "name": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2", "refsource": "MISC", "url": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2" }, { "name": "https://github.com/isomorphic-git/isomorphic-git/pull/1339", "refsource": "MISC", "url": "https://github.com/isomorphic-git/isomorphic-git/pull/1339" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c1.8.2", "affected_versions": "All versions before 1.8.2", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2021-08-03", "description": "isomorphic-git allows Directory Traversal via a crafted repository.", "fixed_versions": [ "1.8.2" ], "identifier": "CVE-2021-30483", "identifiers": [ "CVE-2021-30483" ], "not_impacted": "All versions starting from 1.8.2", "package_slug": "npm/isomorphic-git", "pubdate": "2021-07-30", "solution": "Upgrade to version 1.8.2 or above.", "title": "Path Traversal", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-30483" ], "uuid": "24de66d4-abad-48ba-bfaa-5a53f7299c34" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isomorphic-git:isomorphic-git:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.8.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30483" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/isomorphic-git/isomorphic-git/pull/1339", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/isomorphic-git/isomorphic-git/pull/1339" }, { "name": "https://vuln.ryotak.me/advisories/28", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://vuln.ryotak.me/advisories/28" }, { "name": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2", "refsource": "MISC", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2021-08-03T23:49Z", "publishedDate": "2021-07-30T14:15Z" } } }
ghsa-fgxq-p49f-qw99
Vulnerability from github
Published
2021-09-02 22:00
Modified
2021-08-31 21:02
Severity ?
Summary
Directory Traversal in isomorphic-git
Details
isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "isomorphic-git" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.8.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-30483" ], "database_specific": { "cwe_ids": [ "CWE-22" ], "github_reviewed": true, "github_reviewed_at": "2021-08-02T18:05:52Z", "nvd_published_at": "2021-07-30T14:15:00Z", "severity": "MODERATE" }, "details": "isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.", "id": "GHSA-fgxq-p49f-qw99", "modified": "2021-08-31T21:02:23Z", "published": "2021-09-02T22:00:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30483" }, { "type": "WEB", "url": "https://github.com/isomorphic-git/isomorphic-git/pull/1339" }, { "type": "PACKAGE", "url": "https://github.com/isomorphic-git/isomorphic-git" }, { "type": "WEB", "url": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2" }, { "type": "WEB", "url": "https://vuln.ryotak.me/advisories/28" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Directory Traversal in isomorphic-git" }
rhsa-2023_0074
Vulnerability from csaf_redhat
Published
2023-01-11 11:29
Modified
2024-11-22 21:11
Summary
Red Hat Security Advisory: RHV 4.4 SP1 [ovirt-4.5.3-3] security update
Notes
Topic
Updated RHV packages that fix several bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.
Security fix(es):
* mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)
* isomorphic-git: Directory traversal via a crafted repository (CVE-2021-30483)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* With this release, SELinux rules for the Grafana HTTP port are now properly set up for new remote DWH installations as part of the Red Hat Virtualization Manager engine-setup. (BZ#2126778)
* Previously, search conditions were not applied properly when a non-admin user tried to search for Clusters or Data Centers over the REST API. In this release, both admin and non-admin users can search for clusters properly using the REST API. (BZ#2144346)
* Previously, stale bitmaps in the base image during a cold or live internal merge caused the operation to fail. In this release, the merge operation succeeds. (BZ#2141371)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated RHV packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.\n\nSecurity fix(es):\n\n* mina-sshd: Java unsafe deserialization vulnerability\u00a0(CVE-2022-45047)\n\n* isomorphic-git: Directory traversal via a crafted repository (CVE-2021-30483)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* With this release, SELinux rules for the Grafana HTTP port are now properly set up for new remote DWH installations as part of the Red Hat Virtualization Manager engine-setup. (BZ#2126778)\n\n* Previously, search conditions were not applied properly when a non-admin user tried to search for Clusters or Data Centers over the REST API. In this release, both admin and non-admin users can search for clusters properly using the REST API. (BZ#2144346)\n\n* Previously, stale bitmaps in the base image during a cold or live internal merge caused the operation to fail. In this release, the merge operation succeeds. (BZ#2141371)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:0074", "url": "https://access.redhat.com/errata/RHSA-2023:0074" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1988539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988539" }, { "category": "external", "summary": "2126778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126778" }, { "category": "external", "summary": "2141371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141371" }, { "category": "external", "summary": "2144346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144346" }, { "category": "external", "summary": "2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "2152015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152015" }, { "category": "external", "summary": "2152845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152845" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0074.json" } ], "title": "Red Hat Security Advisory: RHV 4.4 SP1 [ovirt-4.5.3-3] security update", "tracking": { "current_release_date": "2024-11-22T21:11:29+00:00", "generator": { "date": "2024-11-22T21:11:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:0074", "initial_release_date": "2023-01-11T11:29:09+00:00", "revision_history": [ { "date": "2023-01-11T11:29:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-01-11T11:29:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T21:11:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product": { "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:4.4:el8" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "ovirt-engine-0:4.5.3.5-1.el8ev.src", "product": { "name": "ovirt-engine-0:4.5.3.5-1.el8ev.src", "product_id": "ovirt-engine-0:4.5.3.5-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.5.3.5-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "apache-sshd-1:2.9.2-0.1.el8ev.src", "product": { "name": "apache-sshd-1:2.9.2-0.1.el8ev.src", "product_id": "apache-sshd-1:2.9.2-0.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-sshd@2.9.2-0.1.el8ev?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src", "product": { "name": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src", "product_id": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.3.7-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.9.3-1.el8ev.src", "product": { "name": "ovirt-web-ui-0:1.9.3-1.el8ev.src", "product_id": "ovirt-web-ui-0:1.9.3-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.9.3-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "product": { "name": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "product_id": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhv-log-collector-analyzer@1.0.16-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "vdsm-0:4.50.3.6-1.el8ev.src", "product": { "name": "vdsm-0:4.50.3.6-1.el8ev.src", "product_id": "vdsm-0:4.50.3.6-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.50.3.6-1.el8ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-backend@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "product_id": "python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhvm-0:4.5.3.5-1.el8ev.noarch", "product": { "name": "rhvm-0:4.5.3.5-1.el8ev.noarch", "product_id": "rhvm-0:4.5.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm@4.5.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "apache-sshd-1:2.9.2-0.1.el8ev.noarch", "product": { "name": "apache-sshd-1:2.9.2-0.1.el8ev.noarch", "product_id": "apache-sshd-1:2.9.2-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-sshd@2.9.2-0.1.el8ev?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch", "product": { "name": "apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch", "product_id": "apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.9.2-0.1.el8ev?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "product": { "name": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "product_id": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.3.7-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "product": { "name": "ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "product_id": "ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.9.3-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "product": { "name": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "product_id": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhv-log-collector-analyzer@1.0.16-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-api-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-api-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-api-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-api@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-client-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-client-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-client-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-client@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-common-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-common-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-common-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-common@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-http-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-http-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-http-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-http@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-python-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-python-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.50.3.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "product_id": "vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.50.3.6-1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.50.3.6-1.el8ev.x86_64", "product": { "name": "vdsm-0:4.50.3.6-1.el8ev.x86_64", "product_id": "vdsm-0:4.50.3.6-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.50.3.6-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "product": { "name": "vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "product_id": "vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.50.3.6-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "product": { "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "product_id": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.50.3.6-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.50.3.6-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "product": { "name": "vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "product_id": "vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.50.3.6-1.el8ev?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.50.3.6-1.el8ev.ppc64le", "product": { "name": "vdsm-0:4.50.3.6-1.el8ev.ppc64le", "product_id": "vdsm-0:4.50.3.6-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.50.3.6-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "product": { "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "product_id": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.50.3.6-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.50.3.6-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "product": { "name": "vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "product_id": "vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.50.3.6-1.el8ev?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.3.6-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src" }, "product_reference": "vdsm-0:4.50.3.6-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-api-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-client-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-common-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-http-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-python-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.3.6-1.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src" }, "product_reference": "vdsm-0:4.50.3.6-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-api-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-client-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-common-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-http-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.3.6-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le" }, "product_reference": "vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.3.6-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64" }, "product_reference": "vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-python-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-sshd-1:2.9.2-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.noarch" }, "product_reference": "apache-sshd-1:2.9.2-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-sshd-1:2.9.2-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.src" }, "product_reference": "apache-sshd-1:2.9.2-0.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch" }, "product_reference": "apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.5.3.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.src" }, "product_reference": "ovirt-engine-0:4.5.3.5-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch" }, "product_reference": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src" }, "product_reference": "ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.9.3-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.noarch" }, "product_reference": "ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.9.3-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.src" }, "product_reference": "ovirt-web-ui-0:1.9.3-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch" }, "product_reference": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src" }, "product_reference": "rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-0:4.5.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhvm-0:4.5.3.5-1.el8ev.noarch" }, "product_reference": "rhvm-0:4.5.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-30483", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.3.5-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988539" } ], "notes": [ { "category": "description", "text": "A flaw was found in isomorphic-git. An attacker could cause a Directory Traversal via a crafted filepath in a repository being cloned.", "title": "Vulnerability description" }, { "category": "summary", "text": "isomorphic-git: Directory traversal via a crafted repository", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Virtualization, isomorphic-git is a build time dependency and is not delivered with the product. Therefore impact has been rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.3.5-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30483" }, { "category": "external", "summary": "RHBZ#1988539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988539" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30483", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30483" }, { "category": "external", "summary": "https://github.com/isomorphic-git/isomorphic-git/pull/1339", "url": "https://github.com/isomorphic-git/isomorphic-git/pull/1339" }, { "category": "external", "summary": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2", "url": "https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2" }, { "category": "external", "summary": "https://vuln.ryotak.me/advisories/28", "url": "https://vuln.ryotak.me/advisories/28" } ], "release_date": "2021-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-11T11:29:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0074" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "isomorphic-git: Directory traversal via a crafted repository" }, { "cve": "CVE-2022-45047", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-11-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.3.5-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2145194" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd: Java unsafe deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.3.5-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45047" }, { "category": "external", "summary": "RHBZ#2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047" }, { "category": "external", "summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" } ], "release_date": "2022-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-11T11:29:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0074" }, { "category": "workaround", "details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).", "product_ids": [ "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.7-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.3-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.16-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.3.5-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.3.6-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.3.6-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-1:2.9.2-0.1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-1:2.9.2-0.1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mina-sshd: Java unsafe deserialization vulnerability" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.