Action not permitted
Modal body text goes here.
cve-2021-36221
Vulnerability from cvelistv5
Published
2021-08-08 00:00
Modified
2024-08-04 00:54
Severity
Summary
Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:54:50.729Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/golang-announce" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0" }, { "name": "FEDORA-2021-38b51d9fd3", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4AMYYHGBYMIWCCR5RCDFI5RAUJOPO5L/" }, { "name": "FEDORA-2021-6a3024b3fd", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/golang-announce" }, { "url": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0" }, { "name": "FEDORA-2021-38b51d9fd3", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4AMYYHGBYMIWCCR5RCDFI5RAUJOPO5L/" }, { "name": "FEDORA-2021-6a3024b3fd", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36221", "datePublished": "2021-08-08T00:00:00", "dateReserved": "2021-07-07T00:00:00", "dateUpdated": "2024-08-04T00:54:50.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-36221\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-08-08T06:15:08.740\",\"lastModified\":\"2023-11-07T03:36:44.107\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.\"},{\"lang\":\"es\",\"value\":\"Go versiones anteriores a 1.15.15 y 1.16.x versiones anteriores a 1.16.7, presenta una condici\u00f3n de carrera que puede conllevar un p\u00e1nico de net/http/httputil ReverseProxy al abortar ErrAbortHandler\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.15.15\",\"matchCriteriaId\":\"E2C67AB5-BE7B-467B-BB8C-489371C753AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.16.0\",\"versionEndExcluding\":\"1.16.7\",\"matchCriteriaId\":\"F99C17E3-F1B9-4E38-B5C8-9D6C5F4C3423\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.1.1.0\",\"matchCriteriaId\":\"20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0\",\"matchCriteriaId\":\"9FC41AD4-69E5-48D8-8216-671F485C3C40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52A77C9D-E59C-4397-B834-797D7B334A6B\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21forum/golang-announce\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/uHACNfXAZqk\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4AMYYHGBYMIWCCR5RCDFI5RAUJOPO5L/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
icsa-22-167-09
Vulnerability from csaf_cisa
Published
2022-06-16 00:00
Modified
2022-06-16 00:00
Summary
Siemens SCALANCE LPE9403 Third-Party Vulnerabilities
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could cause crashes and unrestricted file access, impacting the product 's confidentiality, integrity, and availability.
Critical infrastructure sectors
Multiple sectors
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause crashes and unrestricted file access, impacting the product \u0027s confidentiality, integrity, and availability.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-222547.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-222547.txt" } ], "title": "Siemens SCALANCE LPE9403 Third-Party Vulnerabilities", "tracking": { "current_release_date": "2022-06-16T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-167-09", "initial_release_date": "2022-06-16T00:00:00.000000Z", "revision_history": [ { "date": "2022-06-16T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-167-09 Siemens SCALANCE LPE9403 Third-Party Vulnerabilities" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V2.0", "product": { "name": "SCALANCE LPE9403", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK5998-3GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE LPE9403" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-27304 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2020-27304 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-27304" }, { "cve": "CVE-2021-20317", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-20317 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-20317 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-20317.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20317" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-20317" }, { "cve": "CVE-2021-33910", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-33910 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-33910 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-33910.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33910" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-33910" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition vulnerability was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-36221 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-36221 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-36221.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36221" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-36221" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The fix for CVE-2021-33196 can be bypassed by crafted inputs. As a result, the NewReader and OpenReader functions in archive/zip can still cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39293 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-39293 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39293.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41089", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Moby (Docker Engine) where attempting to copy files using docker cp into a specially-crafted container can result in Unix file permission changes for existing files in the host\u2019s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41089 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41089 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41089.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41089" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Moby (Docker Engine) where the data directory (typically /var/lib/docker) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41091 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41091 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41091.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41091" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41091" }, { "cve": "CVE-2021-41092", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Docker CLI where running docker login my-private-registry.example.com with a misconfigured configuration file (typically ~/.docker/config.json) listing a credsStore or credHelpers that could not be executed would result in any provided credentials being sent to registry-1.docker.io rather than the intended private registry.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41092 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41092 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41092.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41092" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41092" }, { "cve": "CVE-2021-41103", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41103 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41103 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41103.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41103" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41103" }, { "cve": "CVE-2022-0847", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2022-0847 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2022-0847 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2022-0847.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0847" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-0847" } ] }
rhsa-2021_4156
Vulnerability from csaf_redhat
Published
2021-11-09 17:49
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The following packages have been upgraded to a later upstream version: golang (1.16.7). (BZ#1938071)
Security Fix(es):
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nThe following packages have been upgraded to a later upstream version: golang (1.16.7). (BZ#1938071)\n\nSecurity Fix(es):\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4156", "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1972825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972825" }, { "category": "external", "summary": "1976168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976168" }, { "category": "external", "summary": "1979100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979100" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_4156.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:20:33+00:00", "generator": { "date": "2024-09-18T04:20:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:4156", "initial_release_date": "2021-11-09T17:49:22+00:00", "revision_history": [ { "date": "2021-11-09T17:49:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T17:49:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8050020210817155413:8aa62369", "product": { "name": "go-toolset:rhel8:8050020210817155413:8aa62369", "product_id": "go-toolset:rhel8:8050020210817155413:8aa62369", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8050020210817155413:8aa62369" } } }, { "category": "product_version", "name": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=src" } } }, { "category": "product_version", "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "product": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "product_id": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_id": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product": { "name": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_id": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product": { "name": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_id": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, "product_reference": "go-toolset:rhel8:8050020210817155413:8aa62369", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src" }, "product_reference": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64" }, "product_reference": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64" }, "product_reference": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64" }, "product_reference": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2022_0318
Vulnerability from csaf_redhat
Published
2022-01-27 16:52
Modified
2024-09-18 14:40
Summary
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update
Notes
Topic
An update is now available for Red Hat Openshift distributed tracing 2.1.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Release of Red Hat OpenShift distributed Tracing provides these changes:
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
The Red Hat OpenShift distributed tracing release notes provide information on
the features and known issues:
https://docs.openshift.com/container-platform/latest/distr_tracing/distributed-tracing-release-notes.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Openshift distributed tracing 2.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Release of Red Hat OpenShift distributed Tracing provides these changes:\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThe Red Hat OpenShift distributed tracing release notes provide information on\nthe features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distributed-tracing-release-notes.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0318", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "TRACING-2235", "url": "https://issues.redhat.com/browse/TRACING-2235" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0318.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update", "tracking": { "current_release_date": "2024-09-18T14:40:41+00:00", "generator": { "date": "2024-09-18T14:40:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0318", "initial_release_date": "2022-01-27T16:52:20+00:00", "revision_history": [ { "date": "2022-01-27T16:52:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-28T15:04:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:40:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift distributed tracing 2.1", "product": { "name": "Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_distributed_tracing:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift distributed tracing" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "product_id": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "product_id": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "product_id": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "product_id": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "product_id": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "product_id": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2022_1276
Vulnerability from csaf_redhat
Published
2022-04-07 18:02
Modified
2024-09-18 14:41
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update
Notes
Topic
Red Hat OpenShift Service Mesh 2.0.9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)
* envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)
* istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)
* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)
* envoy: Use-after-free when response filters increase response data (CVE-2021-43825)
* envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)
* envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)
* istio: unauthenticated control plane denial of service attack (CVE-2022-23635)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 2.0.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)\n\n* envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)\n\n* istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)\n\n* envoy: Use-after-free when response filters increase response data (CVE-2021-43825)\n\n* envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)\n\n* envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)\n\n* istio: unauthenticated control plane denial of service attack (CVE-2022-23635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1276", "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1954368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "2050744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744" }, { "category": "external", "summary": "2050746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746" }, { "category": "external", "summary": "2050748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748" }, { "category": "external", "summary": "2050753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753" }, { "category": "external", "summary": "2050757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757" }, { "category": "external", "summary": "2050758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758" }, { "category": "external", "summary": "2057277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277" }, { "category": "external", "summary": "2061638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_1276.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update", "tracking": { "current_release_date": "2024-09-18T14:41:08+00:00", "generator": { "date": "2024-09-18T14:41:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:1276", "initial_release_date": "2022-04-07T18:02:07+00:00", "revision_history": [ { "date": "2022-04-07T18:02:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-07T18:02:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:41:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.0", "product": { "name": "OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.src", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.src", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.src", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.src", "product_id": "servicemesh-operator-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-0:2.0.9-3.el8.src", "product_id": "servicemesh-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=src" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.src", "product_id": "servicemesh-cni-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-operator-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-cni-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-29482", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954368" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/ulikunitz/xz. The function readUvarint may not terminate a loop what could lead to denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth authentication, therefore the impact is low.\nIn OCP before 4.7 the buildah, skopeo and podman packages include vulnerable version of github.com/ulikunitz/xz, but these OCP releases are already in the Maintenance Phase of the support, hence affected components are marked as wontfix. This may be fixed in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29482" }, { "category": "external", "summary": "RHBZ#1954368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482" } ], "release_date": "2020-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service" }, { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2021-43824", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050744" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. A crafted request can potentially trigger a NULL pointer dereference when using a WT filter safe_regex match.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Null pointer dereference when using JWT filter safe_regex match", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43824" }, { "category": "external", "summary": "RHBZ#2050744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43824", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Null pointer dereference when using JWT filter safe_regex match" }, { "cve": "CVE-2021-43825", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050746" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. If the amount of buffered data by envoy goes over the limit, the buffer may overflow while a response is being processed by the filter chain. This issue possibly causes the operation to abort incorrectly, resulting in the access of a freed memory block.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Use-after-free when response filters increase response data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43825" }, { "category": "external", "summary": "RHBZ#2050746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43825", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Use-after-free when response filters increase response data" }, { "cve": "CVE-2021-43826", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050748" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. If a downstream source disconnects during upstream connection establishment when tunneling TCP over HTTP, a use-after-free can occur, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Use-after-free when tunneling TCP over HTTP", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43826" }, { "category": "external", "summary": "RHBZ#2050748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43826", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Use-after-free when tunneling TCP over HTTP" }, { "cve": "CVE-2022-21654", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050753" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. When certificate validation settings are changed, incorrect configuration handling allows TLS session reuse without revalidation.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21654" }, { "category": "external", "summary": "RHBZ#2050753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21654", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation" }, { "cve": "CVE-2022-21655", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050757" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. Due to incorrect handling of the common router, a segfault is possible when internal redirects are routes with a direct response entry.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Incorrect handling of internal redirects to routes with a direct response entry", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21655" }, { "category": "external", "summary": "RHBZ#2050757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: Incorrect handling of internal redirects to routes with a direct response entry" }, { "cve": "CVE-2022-23606", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050758" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. When a cluster is deleted via the Cluster Discovery Service, a stack exhaustion may occur.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23606" }, { "category": "external", "summary": "RHBZ#2050758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23606", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23606" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service" }, { "cve": "CVE-2022-23635", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2022-02-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2057277" } ], "notes": [ { "category": "description", "text": "A flaw was found in istio. This flaw allows an attacker to send a specially crafted message to isitiod, causing the control plane to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio: unauthenticated control plane denial of service attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23635" }, { "category": "external", "summary": "RHBZ#2057277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635" }, { "category": "external", "summary": "https://istio.io/latest/news/security/istio-security-2022-003", "url": "https://istio.io/latest/news/security/istio-security-2022-003" } ], "release_date": "2022-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "istio: unauthenticated control plane denial of service attack" }, { "acknowledgments": [ { "names": [ "Oliver Liu, John Howard and Jacob Delgado" ], "organization": "Istio Product Security Working Group", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-24726", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-03-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061638" } ], "notes": [ { "category": "description", "text": "A stack exhaustion flaw was found in the Istio control plane. This flaw allows a remote unauthenticated attacker to send a specially crafted or oversized message to crash the control plane process, resulting in a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24726" }, { "category": "external", "summary": "RHBZ#2061638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24726", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726" }, { "category": "external", "summary": "https://istio.io/latest/news/security/istio-security-2022-004/", "url": "https://istio.io/latest/news/security/istio-security-2022-004/" } ], "release_date": "2022-03-09T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion" } ] }
rhsa-2022_4668
Vulnerability from csaf_redhat
Published
2022-05-18 20:25
Modified
2024-09-18 04:22
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.10.1 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.10.1 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.10.1 images:
RHEL-8-CNV-4.10
==============
virtio-win-container-v4.10.1-4
hostpath-provisioner-operator-container-v4.10.1-6
bridge-marker-container-v4.10.1-12
cnv-containernetworking-plugins-container-v4.10.1-12
ovs-cni-plugin-container-v4.10.1-12
kubemacpool-container-v4.10.1-12
ovs-cni-marker-container-v4.10.1-12
kubernetes-nmstate-handler-container-v4.10.1-12
cluster-network-addons-operator-container-v4.10.1-12
cnv-must-gather-container-v4.10.1-15
hyperconverged-cluster-webhook-container-v4.10.1-19
hyperconverged-cluster-operator-container-v4.10.1-19
kubevirt-ssp-operator-container-v4.10.1-10
virt-cdi-apiserver-container-v4.10.1-16
virt-cdi-controller-container-v4.10.1-16
hostpath-provisioner-container-v4.10.1-5
virt-cdi-uploadserver-container-v4.10.1-16
node-maintenance-operator-container-v4.10.1-4
virt-cdi-operator-container-v4.10.1-16
virt-cdi-uploadproxy-container-v4.10.1-16
hostpath-csi-driver-container-v4.10.1-5
virt-cdi-cloner-container-v4.10.1-16
kubevirt-template-validator-container-v4.10.1-4
virt-cdi-importer-container-v4.10.1-16
virt-api-container-v4.10.1-8
virt-handler-container-v4.10.1-8
virt-controller-container-v4.10.1-8
virt-launcher-container-v4.10.1-8
virt-artifacts-server-container-v4.10.1-8
libguestfs-tools-container-v4.10.1-8
virt-operator-container-v4.10.1-8
hco-bundle-registry-container-v4.10.1-99
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.10.1 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.10.1 images:\n\nRHEL-8-CNV-4.10\n==============\n\nvirtio-win-container-v4.10.1-4\nhostpath-provisioner-operator-container-v4.10.1-6\nbridge-marker-container-v4.10.1-12\ncnv-containernetworking-plugins-container-v4.10.1-12\novs-cni-plugin-container-v4.10.1-12\nkubemacpool-container-v4.10.1-12\novs-cni-marker-container-v4.10.1-12\nkubernetes-nmstate-handler-container-v4.10.1-12\ncluster-network-addons-operator-container-v4.10.1-12\ncnv-must-gather-container-v4.10.1-15\nhyperconverged-cluster-webhook-container-v4.10.1-19\nhyperconverged-cluster-operator-container-v4.10.1-19\nkubevirt-ssp-operator-container-v4.10.1-10\nvirt-cdi-apiserver-container-v4.10.1-16\nvirt-cdi-controller-container-v4.10.1-16\nhostpath-provisioner-container-v4.10.1-5\nvirt-cdi-uploadserver-container-v4.10.1-16\nnode-maintenance-operator-container-v4.10.1-4\nvirt-cdi-operator-container-v4.10.1-16\nvirt-cdi-uploadproxy-container-v4.10.1-16\nhostpath-csi-driver-container-v4.10.1-5\nvirt-cdi-cloner-container-v4.10.1-16\nkubevirt-template-validator-container-v4.10.1-4\nvirt-cdi-importer-container-v4.10.1-16\nvirt-api-container-v4.10.1-8\nvirt-handler-container-v4.10.1-8\nvirt-controller-container-v4.10.1-8\nvirt-launcher-container-v4.10.1-8\nvirt-artifacts-server-container-v4.10.1-8\nlibguestfs-tools-container-v4.10.1-8\nvirt-operator-container-v4.10.1-8\nhco-bundle-registry-container-v4.10.1-99\n\nSecurity Fix(es):\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n\n* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:4668", "url": "https://access.redhat.com/errata/RHSA-2022:4668" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2000478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000478" }, { "category": "external", "summary": "2022742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022742" }, { "category": "external", "summary": "2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "2028619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028619" }, { "category": "external", "summary": "2029359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029359" }, { "category": "external", "summary": "2032837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032837" }, { "category": "external", "summary": "2033385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033385" }, { "category": "external", "summary": "2038814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038814" }, { "category": "external", "summary": "2039019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039019" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2046686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046686" }, { "category": "external", "summary": "2049990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049990" }, { "category": "external", "summary": "2053390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053390" }, { "category": "external", "summary": "2054778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054778" }, { "category": "external", "summary": "2054782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054782" }, { "category": "external", "summary": "2055304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055304" }, { "category": "external", "summary": "2055950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055950" }, { "category": "external", "summary": "2056421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056421" }, { "category": "external", "summary": "2056464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056464" }, { "category": "external", "summary": "2056619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056619" }, { "category": "external", "summary": "2057142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057142" }, { "category": "external", "summary": "2057148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057148" }, { "category": "external", "summary": "2057613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057613" }, { "category": "external", "summary": "2059185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059185" }, { "category": "external", "summary": "2059613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059613" }, { "category": "external", "summary": "2062227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062227" }, { "category": "external", "summary": "2062321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062321" }, { "category": "external", "summary": "2063991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063991" }, { "category": "external", "summary": "2065308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065308" }, { "category": "external", "summary": "2065743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065743" }, { "category": "external", "summary": "2065755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065755" }, { "category": "external", "summary": "2066086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066086" }, { "category": "external", "summary": "2066712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066712" }, { "category": "external", "summary": "2069055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069055" }, { "category": "external", "summary": "2070050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070050" }, { "category": "external", "summary": "2073880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073880" }, { "category": "external", "summary": "2077920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077920" }, { "category": "external", "summary": "2078878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078878" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_4668.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.10.1 Images security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:22:34+00:00", "generator": { "date": "2024-09-18T04:22:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:4668", "initial_release_date": "2022-05-18T20:25:33+00:00", "revision_history": [ { "date": "2022-05-18T20:25:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-18T20:25:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:22:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.10 for RHEL 8", "product": { "name": "CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.10::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.10.1-12" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.10.1-12" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.10.1-12" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.10.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.10.1-99" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.10.1-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.10.1-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.10.1-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.10.1-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.10.1-19" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.10.1-19" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.10.1-12" } } }, { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.10.1-12" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.10.1-10" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.10.1-4" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.10.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.10.1-4" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.10.1-12" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.10.1-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "product_id": "container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.10.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.10.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.10.1-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.10.1-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.10.1-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.10.1-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.10.1-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.10.1-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.10.1-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.10.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.10.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.10.1-4" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.10.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.10.1-8" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4668" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-41190", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024938" } ], "notes": [ { "category": "description", "text": "The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Image Specification, the manifest and index documents were not self-describing and documents with a single digest could be interpreted as either a manifest or an index. In the OCI Image Specification version 1.0.1 there is specified a recommendation that both manifest and index documents contain a `mediaType` field to identify the type of document.", "title": "Vulnerability description" }, { "category": "summary", "text": "opencontainers: OCI manifest and index parsing confusion", "title": "Vulnerability summary" }, { "category": "other", "text": "As a consequence of the OCI Image Specification (and OCI Distribution Specification [1]), container runtime engines (like containerd, moby - Docker Engine, cri-o) deliver updates to adopt new `mediaType` field used for identification of the document type. Even though some Red Hat products rely on container engine, the impact by this issue is LOW.\n\n[1] https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41190" }, { "category": "external", "summary": "RHBZ#2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190" }, { "category": "external", "summary": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42", "url": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42" }, { "category": "external", "summary": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "url": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m" }, { "category": "external", "summary": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh", "url": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh" } ], "release_date": "2021-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4668" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "opencontainers: OCI manifest and index parsing confusion" }, { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:4541ed04a67e85fae426a5a58695339e583e2692878dca1cc93c62b5e1e30fd3_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:79ad494103e90fb80f012c4324555e6f93c4c37df85b1ecea9f80495a521e01f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:50d63dbcda94374e6d40b01632619fd81ce0e800166cfa1c08711e145cbcf0d6_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:5d815abb91431f9a88981c52b071ab991b4b74f5801be2bdc6ea7570c9451f34_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:ac8b60a91411c0fcc4ab2c52db8b6e7682ee747c8969dde9ad8d1a5aa7d44772_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:e77159a8bbe92d5b54fb268f6b53d56f905ac6bbb10cd678d10db9609dfdf2fe_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:7fc8e3971a085fb4f0417d9bc412f37a8ac1ca93e619fbd85862682d7d0d24cc_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:683aefe3e095f21c07489793644413aec5f55e5c6193f7961a17c95a42aaf5a4_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:788b98d8e719fc6a7395882f209361da891d81253252e1874d2b5fcd8b272042_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:580b463fab66f776bdda7b9337ca229cdf7559616756b3dde5f4fde81fcebe08_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:e748c16a1a1a9ba19decb60cad5625f9e9e4987c72a54907d826f731e229becd_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:ffd3823014509a0ce3b72ece5caa34e0c331f0133e284ce08614113445d256c4_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:5dd05762652a895bc48db344e573942e0d291175b2391e60d152ce60b6e3ea3e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:abc1c2b5726805ca4ccd1ed50dc7ab3706bc36ffa31d499cd6374242118180e3_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:563507ce784589a79aaa4d8c29742f098f6501d17d9f477472e279556e8e15ce_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a2401108688b44ef1fd9b187894358b4536ad9b2b5c436d507ff15f9f6af0f9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:db0489f5160a0f569c0b0b05d6e26e7ff5618dd0cde85d77133b76fd70b9c5b7_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:4455b45f19f5223e5239bad8bc30b258f33025545d7a16314303ed60af00a2fa_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:1e3615ff55c43d1bf7f5a9be449179d896271f90837476f6c545c917637466a8_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:f810c2421d77579caabec7dfcbf82dc3840751c486669df02d2877c9f1962436_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:63b3b7a87a8f9360248e9ff45ac46484c18bb972c735fe8e4b6bdf127d943b47_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:7ead858553adfb95b5a2704cc2dca061a5f36de7575d829e0568a94b09a55573_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:b5a320e87976d906b9aa37da2cd9f40f54e05847245345e2dc4285633b90460f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:f786ba3de0ca54a9252f5e9f615fa5662c76e0fcffbdf635d3071865758e5c8b_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:4a0d654eea8b9669f082ed092e79b3203a131223b8e534c3414051aad05497b0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4668" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:f1dfaac28b4e889c7433bcb6a8cf84a4ae154e47936cc774d7da7a8361a6090d_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:5beca691807b625e0b7b0d086e4a69ad846753cec6ed31e09fe7b46a78dd75a0_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:cf5542bd64485c1f560dc43b9754e29dcdf460cee0b241d9bc6bf9c83f7bba6d_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:467308015352358d822228ae3247621d83cd51fb20a87384623706ec648bb0e9_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:76f695ed58f0b255fb0a8a672744cde4193e231b98d1539dfd811ad390dff56c_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:9acd4b9e8b289064491b5749aa7c642dd5f0470f70f0503c1f7c7c047053760f_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:9199f9bc2dbeb91874f2865e4162c681e1f75a41f5cc73702226424345971e85_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" } ] }
rhsa-2022_0561
Vulnerability from csaf_redhat
Published
2022-02-23 12:57
Modified
2022-02-23 12:57
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.9.22 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.9.22. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHSA-2022:0557
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
You may download the oc tool and use it to inspect release image metadata
as follows:
(For x86_64 architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-x86_64
The image digest is
sha256:912e4b9986f690b894fcb740881e780600e12ab22f128f6f873bc4e1fcda8d13
(For s390x architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-s390x
The image digest is
sha256:fa19f34390bc50968af736bdedb193b36d5d832b1090bf215e1fe279f05d6c94
(For ppc64le architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le
The image digest is
sha256:857cab82eba0ad370669258da450b89d8c6e5cea25c61ee930f9e30bfcd515dd
All OpenShift Container Platform 4.9 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.9.22. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2022:0557\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n$ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-x86_64\n\nThe image digest is\nsha256:912e4b9986f690b894fcb740881e780600e12ab22f128f6f873bc4e1fcda8d13\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-s390x\n\nThe image digest is\nsha256:fa19f34390bc50968af736bdedb193b36d5d832b1090bf215e1fe279f05d6c94\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le\n\nThe image digest is\nsha256:857cab82eba0ad370669258da450b89d8c6e5cea25c61ee930f9e30bfcd515dd\n\nAll OpenShift Container Platform 4.9 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0561", "url": "https://access.redhat.com/errata/RHSA-2022:0561" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0561.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update", "tracking": { "current_release_date": "2022-02-23T12:57:00Z", "generator": { "date": "2023-07-01T05:21:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2022:0561", "initial_release_date": "2022-02-23T12:57:00Z", "revision_history": [ { "date": "2022-02-23T12:57:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "product": { "name": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "product_id": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream" } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "product": { "name": "openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "product_id": "openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream" } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "product": { "name": "openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "product_id": "openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "product": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "product": { "name": "openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "product_id": "openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "product": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "product_id": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "product": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "product_id": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "product": { "name": "openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "product_id": "openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "product": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "product_id": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "product": { "name": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "product_id": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "product": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "product_id": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product": { "name": "openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product_id": "openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product": { "name": "openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product_id": "openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product": { "name": "openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product_id": "openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "product": { "name": "openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "product_id": "openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "product": { "name": "openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "product_id": "openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "product": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "product_id": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "product": { "name": "openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "product_id": "openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "product": { "name": "openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "product_id": "openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "product": { "name": "openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "product_id": "openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "product": { "name": "openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "product_id": "openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "product": { "name": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "product_id": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "product": { "name": "openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "product_id": "openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "product_id": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "product_id": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "product": { "name": "openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "product_id": "openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "product": { "name": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "product_id": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "product": { "name": "openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "product_id": "openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "product": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "product_id": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "product_id": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "product": { "name": "openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "product_id": "openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "product": { "name": "openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "product_id": "openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "product": { "name": "openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "product_id": "openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "product": { "name": "openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "product_id": "openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "product": { "name": "openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "product_id": "openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "product": { "name": "openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "product_id": "openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "product": { "name": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "product_id": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "product_id": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "product": { "name": "openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "product_id": "openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "product_id": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "product_id": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "product_id": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "product": { "name": "openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "product_id": "openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "product_id": "openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "product": { "name": "openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "product_id": "openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "product_id": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "product": { "name": "openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "product_id": "openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product_id": "openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "product_id": "openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "product": { "name": "openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "product_id": "openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "product": { "name": "openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "product_id": "openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product_id": "openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product": { "name": "openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product_id": "openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "product": { "name": "openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "product_id": "openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "product": { "name": "openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "product_id": "openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "product": { "name": "openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "product_id": "openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "product": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "product_id": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "product": { "name": "openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "product_id": "openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream", "product": { "name": "openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream", "product_id": "openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "product": { "name": "openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "product_id": "openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "product": { "name": "openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "product_id": "openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "product": { "name": "openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "product_id": "openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "product": { "name": "openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "product_id": "openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "product": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product": { "name": "openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product_id": "openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product": { "name": "openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product_id": "openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product": { "name": "openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "product_id": "openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "product": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "product_id": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "product": { "name": "openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "product_id": "openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "product": { "name": "openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "product_id": "openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "product": { "name": "openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "product_id": "openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "product": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "product_id": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "product": { "name": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "product_id": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "product": { "name": "openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "product_id": "openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "product": { "name": "openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "product_id": "openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "product": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "product_id": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "product": { "name": "openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "product_id": "openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "product": { "name": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "product_id": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "product": { "name": "openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "product_id": "openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "product_id": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "product": { "name": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "product_id": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "product_id": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "product": { "name": "openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "product_id": "openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "product_id": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "product_id": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "product": { "name": "openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "product_id": "openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "product": { "name": "openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "product_id": "openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "product_id": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "product_id": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "product_id": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "product": { "name": "openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "product_id": "openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "product": { "name": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "product_id": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "product": { "name": "openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "product_id": "openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "product": { "name": "openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "product_id": "openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "product": { "name": "openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "product_id": "openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "product": { "name": "openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "product_id": "openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "product": { "name": "openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "product_id": "openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "product": { "name": "openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "product_id": "openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "product": { "name": "openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "product_id": "openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "product": { "name": "openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "product_id": "openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "product": { "name": "openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "product_id": "openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "product": { "name": "openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "product_id": "openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "product": { "name": "openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "product_id": "openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "product": { "name": "openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "product_id": "openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "product": { "name": "openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "product_id": "openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "product": { "name": "openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "product_id": "openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "product": { "name": "openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "product_id": "openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product": { "name": "openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "product_id": "openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "product": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "product_id": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "product": { "name": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "product_id": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "product": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "product_id": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "product": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "product_id": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream", "product": { "name": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream", "product_id": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream" }, "product_reference": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream" }, "product_reference": "openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream" }, "product_reference": "openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream" }, "product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream" }, "product_reference": "openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream" }, "product_reference": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream" }, "product_reference": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream" }, "product_reference": "openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" }, "product_reference": "openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream" }, "product_reference": "openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream" }, "product_reference": "openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream" }, "product_reference": "openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream" }, "product_reference": "openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream" }, "product_reference": "openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream" }, "product_reference": "openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream" }, "product_reference": "openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream" }, "product_reference": "openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream" }, "product_reference": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream" }, "product_reference": "openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream" }, "product_reference": "openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream" }, "product_reference": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream" }, "product_reference": "openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream" }, "product_reference": "openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream" }, "product_reference": "openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream" }, "product_reference": "openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream" }, "product_reference": "openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream" }, "product_reference": "openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream" }, "product_reference": "openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream" }, "product_reference": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream" }, "product_reference": "openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" }, "product_reference": "openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream" }, "product_reference": "openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream" }, "product_reference": "openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream" }, "product_reference": "openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream" }, "product_reference": "openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream" }, "product_reference": "openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream" }, "product_reference": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream" }, "product_reference": "openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream" }, "product_reference": "openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream" }, "product_reference": "openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream" }, "product_reference": "openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream" }, "product_reference": "openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" }, "product_reference": "openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream" }, "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream" }, "product_reference": "openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream" }, "product_reference": "openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream" }, "product_reference": "openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream" }, "product_reference": "openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream" }, "product_reference": "openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream" }, "product_reference": "openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream" }, "product_reference": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream" }, "product_reference": "openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream" }, "product_reference": "openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream" }, "product_reference": "openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream" }, "product_reference": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream" }, "product_reference": "openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream" }, "product_reference": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream" }, "product_reference": "openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream" }, "product_reference": "openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream" }, "product_reference": "openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream" }, "product_reference": "openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream" }, "product_reference": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream" }, "product_reference": "openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream" }, "product_reference": "openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream" }, "product_reference": "openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream" }, "product_reference": "openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream" }, "product_reference": "openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream" }, "product_reference": "openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream" }, "product_reference": "openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream" }, "product_reference": "openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream" }, "product_reference": "openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream" }, "product_reference": "openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream" }, "product_reference": "openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" }, "product_reference": "openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" }, { "category": "external", "summary": "CVE-2021-29923", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "bz#1992006: CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" } ], "release_date": "2021-03-22T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2022:0561" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-08-07T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" }, { "category": "external", "summary": "CVE-2021-36221", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "bz#1995656: CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" } ], "release_date": "2021-08-05T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2022:0561" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202202120107.p0.g099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202202140924.p0.ged0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.g18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202202120107.p0.g26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202202120107.p0.g8226e86.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202202120107.p0.g37a1328.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202202120107.p0.gc02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g15e474c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202202120107.p0.gade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202202120107.p0.g1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202202120107.p0.g6e62a54.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202202152352.p0.g5113d1b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202202140924.p0.g340e212.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202202120107.p0.gd642d11.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202202120107.p0.g1d05f80.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202202120107.p0.gbc20153.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202202120107.p0.g68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202202120107.p0.g10af6a9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202202120107.p0.g7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202202120107.p0.g1826b16.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202202120107.p0.g184a513.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202202120107.p0.gc750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202202120107.p0.geedd0dc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202202120107.p0.g19c4e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202202120107.p0.gd886c13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202202120107.p0.g07c25a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202202120107.p0.ga895470.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202202120107.p0.g78b8e48.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202202120107.p0.g5694bdd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202202120107.p0.g7245b0f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202202120107.p0.g993ec9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202202120107.p0.gae7b0a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202202152352.p0.g4d93655.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202202120107.p0.gce0b3ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202202120107.p0.gd293c31.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202202120107.p0.g3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202202120107.p0.g8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202202120107.p0.g2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202202120107.p0.gf2551e5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202202120107.p0.gb84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202202120107.p0.gfdcb82f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202202151621.p0.gc60ddb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202202120107.p0.g44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202202120107.p0.g3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202202120107.p0.gfd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202202120107.p0.g0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202202120107.p0.g0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner:v4.9.0-202202120107.p0.g7736e72.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202202120107.p0.gdad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe:v4.9.0-202202120107.p0.gc13c3a5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar:v4.9.0-202202120107.p0.g3e02b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202202120107.p0.g52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202202120107.p0.g7e2e890.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202202131427.p0.gab2eaa5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202202120107.p0.gf99cada.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202202120107.p0.gd92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.gd8a891d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202202120107.p0.g48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202202120107.p0.g6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202202120107.p0.g3f1401a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202202120417.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202202120107.p0.ge9a66d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202202120107.p0.g90b5722.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202202140924.p0.gaf84740.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202202120107.p0.gadfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy:v4.9.0-202202120107.p0.g58e0929.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202202120107.p0.g6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202202120107.p0.g901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202202120107.p0.g1e8c94f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202202120107.p0.g59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202202120107.p0.g383c9b9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202202150825.p0.gd84a7f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202202120107.p0.g266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202202120107.p0.g3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202202120107.p0.gc249937.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202202120107.p0.gfd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202202120107.p0.g707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202202120107.p0.g43552df.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202202141138.p0.gb181f1f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202202120107.p0.g9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202202120107.p0.g8b203f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202202120107.p0.g1ee9925.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202202161322.p0.gfe6dc77.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202202120107.p0.g79857a3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202202120107.p0.g689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g56efc78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202202120107.p0.gddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202202120107.p0.ga7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202202120107.p0.g8594727.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202202120107.p0.g3cd421d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202202120107.p0.g15a6add.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202202140924.p0.gce028c9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202202120107.p0.gb93fd35.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202202120107.p0.g9f870bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202202120107.p0.g579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202202120107.p0.g1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202202120107.p0.g0869335.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202202120107.p0.g3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202202120107.p0.gecd60f9.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202202120107.p0.gab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202202120107.p0.g03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202202140924.p0.g932d502.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202202120107.p0.ge0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202202120107.p0.g9f56afd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202202120107.p0.g4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202202120107.p0.gde8606f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202202120107.p0.g9302429.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-08-10T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhea-2022_1596
Vulnerability from csaf_redhat
Published
2022-04-26 16:51
Modified
2024-09-18 04:45
Summary
Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images
Notes
Topic
Red Hat OpenShift Virtualization release 4.9.4 is now available with updates to packages and images that fix several bugs and add enhancements.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.9.4 images:
RHEL-8-CNV-4.9
==============
hyperconverged-cluster-webhook-container-v4.9.4-5
hyperconverged-cluster-operator-container-v4.9.4-5
kubevirt-template-validator-container-v4.9.4-5
virtio-win-container-v4.9.4-5
vm-import-operator-container-v4.9.4-5
virt-cdi-operator-container-v4.9.4-7
node-maintenance-operator-container-v4.9.4-5
hostpath-provisioner-container-v4.9.4-5
vm-import-controller-container-v4.9.4-5
cnv-containernetworking-plugins-container-v4.9.4-5
ovs-cni-marker-container-v4.9.4-5
kubevirt-vmware-container-v4.9.4-6
kubernetes-nmstate-handler-container-v4.9.4-7
kubevirt-ssp-operator-container-v4.9.4-5
ovs-cni-plugin-container-v4.9.4-5
vm-import-virtv2v-container-v4.9.4-5
kubevirt-v2v-conversion-container-v4.9.4-5
virt-cdi-cloner-container-v4.9.4-7
bridge-marker-container-v4.9.4-5
hostpath-provisioner-operator-container-v4.9.4-5
kubemacpool-container-v4.9.4-5
virt-cdi-uploadproxy-container-v4.9.4-7
virt-cdi-controller-container-v4.9.4-7
virt-cdi-uploadserver-container-v4.9.4-7
virt-cdi-apiserver-container-v4.9.4-7
cluster-network-addons-operator-container-v4.9.4-7
virt-cdi-importer-container-v4.9.4-7
virt-controller-container-v4.9.4-7
virt-handler-container-v4.9.4-7
virt-api-container-v4.9.4-7
virt-artifacts-server-container-v4.9.4-7
virt-operator-container-v4.9.4-7
virt-launcher-container-v4.9.4-7
libguestfs-tools-container-v4.9.4-7
cnv-must-gather-container-v4.9.4-11
hco-bundle-registry-container-v4.9.4-58
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.9.4 is now available with updates to packages and images that fix several bugs and add enhancements.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.9.4 images:\n\nRHEL-8-CNV-4.9\n==============\nhyperconverged-cluster-webhook-container-v4.9.4-5\nhyperconverged-cluster-operator-container-v4.9.4-5\nkubevirt-template-validator-container-v4.9.4-5\nvirtio-win-container-v4.9.4-5\nvm-import-operator-container-v4.9.4-5\nvirt-cdi-operator-container-v4.9.4-7\nnode-maintenance-operator-container-v4.9.4-5\nhostpath-provisioner-container-v4.9.4-5\nvm-import-controller-container-v4.9.4-5\ncnv-containernetworking-plugins-container-v4.9.4-5\novs-cni-marker-container-v4.9.4-5\nkubevirt-vmware-container-v4.9.4-6\nkubernetes-nmstate-handler-container-v4.9.4-7\nkubevirt-ssp-operator-container-v4.9.4-5\novs-cni-plugin-container-v4.9.4-5\nvm-import-virtv2v-container-v4.9.4-5\nkubevirt-v2v-conversion-container-v4.9.4-5\nvirt-cdi-cloner-container-v4.9.4-7\nbridge-marker-container-v4.9.4-5\nhostpath-provisioner-operator-container-v4.9.4-5\nkubemacpool-container-v4.9.4-5\nvirt-cdi-uploadproxy-container-v4.9.4-7\nvirt-cdi-controller-container-v4.9.4-7\nvirt-cdi-uploadserver-container-v4.9.4-7\nvirt-cdi-apiserver-container-v4.9.4-7\ncluster-network-addons-operator-container-v4.9.4-7\nvirt-cdi-importer-container-v4.9.4-7\nvirt-controller-container-v4.9.4-7\nvirt-handler-container-v4.9.4-7\nvirt-api-container-v4.9.4-7\nvirt-artifacts-server-container-v4.9.4-7\nvirt-operator-container-v4.9.4-7\nvirt-launcher-container-v4.9.4-7\nlibguestfs-tools-container-v4.9.4-7\ncnv-must-gather-container-v4.9.4-11\nhco-bundle-registry-container-v4.9.4-58", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2022:1596", "url": "https://access.redhat.com/errata/RHEA-2022:1596" }, { "category": "external", "summary": "2049800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049800" }, { "category": "external", "summary": "2055546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055546" }, { "category": "external", "summary": "2055786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055786" }, { "category": "external", "summary": "2059111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059111" }, { "category": "external", "summary": "2068147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068147" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhea-2022_1596.json" } ], "title": "Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images", "tracking": { "current_release_date": "2024-09-18T04:45:32+00:00", "generator": { "date": "2024-09-18T04:45:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHEA-2022:1596", "initial_release_date": "2022-04-26T16:51:34+00:00", "revision_history": [ { "date": "2022-04-26T16:51:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-26T16:51:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:45:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.9 for RHEL 8", "product": { "name": "CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.9.4-11" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.9.4-58" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "product": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "product": { "name": "container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "product_id": "container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.9.4-6" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "product_id": "container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.9.4-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "product": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.9.4-5" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64", "product": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64", "product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.9.4-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64" }, "product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64" }, "product_reference": "container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64" }, "product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" }, "product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64", "relates_to_product_reference": "8Base-CNV-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2022:1596" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2022:1596" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2022:1596" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:eb63407b81056963a060f58e7afe807f1b08be88f046b44a4459999cedbf6e99_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:f18bbaeaf277bc146b02ef03cdaf807f955eea6ef50ed0c1e665c72c4a3d42d8_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:364813b965739e72a8fe667e1f451ca2a91a7b1eeb8df66837d4ed201b51e53d_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:8fce40dfb7b1a9cf5a7e95412a04e95f40303777f7659b0d9b69563c299d6edf_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:4247e831589dc4bb2c7557968a373fa7e4beca1fdbc03c793ee21a52ca23e235_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:06a3ad22559f6a7d164f11feeb24345534569b14e9e85fa23f6e1dbfeaaa3313_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:9fbfc7da92a4cc85b46f8d3f0b8aa0f1890465ee59cc79dd9815d24705ee3fc8_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:3a0f236a496da41cacef9120b92fce824d583ed1ff3e4c9020b2f7d07fe24bfe_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:447ac82014865d414a85a5f7b5feb50225ec0edd23a89c8a0b096546a507a88d_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:8ab02a419851ce54a8670cb6cff948b73b3e29f27cdf8bd3cf3425ad1e039d75_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f6ca7f841a6906e46f3738e82f95cf6e244b38e3cb88eeca6db2f3828a236723_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:98a23699e67116f3eb2632f75bd62d61ba7c7511739ef429743147466eadd21f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:9edb68f99fbcb4f4458219ef7993f43f06daa3d0fa31f1ce7c5e6ec42d54a568_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:e1971509511962011b978e04cb61fa9b3762053015b906f22d2a5e52684f887b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:360c214fc6979578b0b8d5ab2df51462444380337aeadbd841fa60828e3b4b9f_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:d433fb1157e3fc62ee4c5df813327cf6a2d8c2b95f2873e629076e25000de09a_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:48390b221ccb1d3a95d0da553f6f02ec32f36602bb91d2ffe08ab8c8bcd586c5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:91b1e6a4aab30c71e8ee9823939bac64b5e4e5447d3a213c9debbd7a6d7a39cb_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:0e517140884f3359c2bb89e3cd9f21c795d05eccc01f40a18050ec8244a42b9b_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:d5c76d3d7ca8a10acde943e43b829a88344fafdb7c0af67065e0a513a7a432b8_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:03bf2793fed7c153865ccaec0e22984e9c814a58d7c69aa5e1ef0acb05719a81_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:28e6cdf743f7a86627a0380ecbea29c9b1942558f35acf4a56118b10ea1f3765_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:3ed022ba0e42eba7261b6d46fb492136ccf2fca4615102db8692b896fc3242b4_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:f676958ba010152c49e97326405453d03eec1ccd246ca47567000189f22483bd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:0b01fc6b88611f08856ad7ea4ba0b81c354e42ca0eab0362c041f2a46c9d8f71_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:9a856c6d48efda1f308e3c53efbb74dc15c132141eb559d018ef5ad89d9a3d7c_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bcc9a647be6e86ac01faefbf82228aaa84f81946add086397dbdec05eb83a87a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:2bba13caf38fa872710c5ec4f042720e1182039b11c65d211d6139eaf176b631_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:f231305d0d7e8c40cbface56d384940cbb566f4d14900c83976e794b60e49982_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8de93e2a69cf8fa2cb0c0d877459f5bc31057f76267ef93bdc7c30db9d2847ae_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:f077c865c52d31950a1addc05d46676aff706f9dec63e0e8c572b7acf1d39577_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:8942132093aa941a25f2707d9baf05a97a1cbaa530095ada903c19db50198886_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:2f3339933eb755bc678df74b834e2016f5f291fd5612816eeff5d69436daa136_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:c57c2c4036f80b790c93303a87d72a748aad7da3a4b051f7118ab9fbaeda7def_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:11c4d75ba0dfc7a13bc921dd1bd84cc0a8fa4e0ddd7eca89924ca1792773278d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:a90837a9a8fe7b48ac693a97ec2eac04bac8d6652c84e12ee980f7ce7dfa0a4f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2021_4765
Vulnerability from csaf_redhat
Published
2021-11-23 08:45
Modified
2024-09-18 04:21
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.19.0
Notes
Topic
Release of OpenShift Serverless Client kn 1.19.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Serverless Client kn 1.19.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.19.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Client kn 1.19.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless Client kn 1.19.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.19.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4765", "url": "https://access.redhat.com/errata/RHSA-2021:4765" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2016255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016255" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_4765.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.19.0", "tracking": { "current_release_date": "2024-09-18T04:21:39+00:00", "generator": { "date": "2024-09-18T04:21:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:4765", "initial_release_date": "2021-11-23T08:45:19+00:00", "revision_history": [ { "date": "2021-11-23T08:45:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-23T08:45:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:21:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.0", "product": { "name": "Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.25.1-1.el8.src", "product": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.src", "product_id": "openshift-serverless-clients-0:0.25.1-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.25.1-1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.25.1-1.el8.x86_64", "product": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.x86_64", "product_id": "openshift-serverless-clients-0:0.25.1-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.25.1-1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "product": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "product_id": "openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.25.1-1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.25.1-1.el8.s390x", "product": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.s390x", "product_id": "openshift-serverless-clients-0:0.25.1-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.25.1-1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.ppc64le" }, "product_reference": "openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.s390x as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.s390x" }, "product_reference": "openshift-serverless-clients-0:0.25.1-1.el8.s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.src as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.src" }, "product_reference": "openshift-serverless-clients-0:0.25.1-1.el8.src", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.25.1-1.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.x86_64" }, "product_reference": "openshift-serverless-clients-0:0.25.1-1.el8.x86_64", "relates_to_product_reference": "8Base-Openshift-Serverless-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4765" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.25.1-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2022_1396
Vulnerability from csaf_redhat
Published
2022-04-19 10:21
Modified
2024-09-18 04:22
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.4 security update
Notes
Topic
The Migration Toolkit for Containers (MTC) 1.5.4 is now available.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Migration Toolkit for Containers (MTC) 1.5.4 is now available.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es):\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1396", "url": "https://access.redhat.com/errata/RHSA-2022:1396" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_1396.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.4 security update", "tracking": { "current_release_date": "2024-09-18T04:22:19+00:00", "generator": { "date": "2024-09-18T04:22:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:1396", "initial_release_date": "2022-04-19T10:21:20+00:00", "revision_history": [ { "date": "2022-04-19T10:21:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-19T10:21:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:22:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.5", "product": { "name": "8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.5::el8" } } }, { "category": "product_name", "name": "7Server-RHMTC-1.5", "product": { "name": "7Server-RHMTC-1.5", "product_id": "7Server-RHMTC-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.5::el7" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.5.4-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64", "product": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64", "product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.5.4-17" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.5.4-8" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.5.4-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.5.4-16" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.5.4-9" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.5.4-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.5.4-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "product": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.5.4-8" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.5.4-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.5.4-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.5.4-6" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "product": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.5.4-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64", "product": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64", "product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.5.4-8" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64 as a component of 7Server-RHMTC-1.5", "product_id": "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64", "relates_to_product_reference": "7Server-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64" }, "product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64" }, "product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1396" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:2b0cac991e694f4521e0181ff67046c0a8c53ecafceb60c2d25025c70a999715_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:2aea8cea5a9c68a1d9b140d92fe754199ed6cb3ad60bde1d6b05f699708de673_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:7769f009c41bb20a74440b81dded27e7b5e0127a3bbaa95478bf9e9f4c2a0efb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:c81788923374059acb3d290bae20f7b6d5ecfc28ee2fc770bd932250d20f0f1c_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:bafbbb7f5704a024798ff6fe390a6d7f525639b23d1710bab2fa914062bb439e_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:7d8a05eb7c8fce2cbb2e51dbdaeca9dbef64198ff3748d7e71c1e257ec5bb785_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:a88f4dd942dfa590def7b212fc55ec7a98626fe6a73c92cf43e62e7d2ffcafa1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:5dd4cd51ff2c5fc083cdd737c479934fab830631d6fabd048e307f5b7485d2a8_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:4a3bffd4032b2a42f676a798730d95fb8ebd53776d3478796b1ec3b3ae6fc17e_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:bb83597c32f91485e447a7ca6331a0b4ce51f18b6938f075444a22953fab8f22_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:5160ff9df003a434ccb359bc4422657398fcac2350864b32653d74838878601c_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:6d8a470212f5cc3874179a518e6c9c08ba475d1cba7bbbeef7963626713225bb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:4462a2fd7d5dce6971dc1e1dc87889fe78fd48598dbf2ad6e6e27d6e0aa277cb_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:501e981baae92b9afca62851c61dfdc04e71920b7a350f6dac3e257ab83ec9e6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2022_7457
Vulnerability from csaf_redhat
Published
2022-11-08 09:27
Modified
2024-09-18 14:41
Summary
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)
* buildah: possible information disclosure and modification (CVE-2022-2990)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\n* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)\n\n* buildah: possible information disclosure and modification (CVE-2022-2990)\n\n* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7457", "url": "https://access.redhat.com/errata/RHSA-2022:7457" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index" }, { "category": "external", "summary": "1820551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820551" }, { "category": "external", "summary": "1941727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941727" }, { "category": "external", "summary": "1945929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945929" }, { "category": "external", "summary": "1974423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974423" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1996050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996050" }, { "category": "external", "summary": "2005866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005866" }, { "category": "external", "summary": "2009264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009264" }, { "category": "external", "summary": "2009346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009346" }, { "category": "external", "summary": "2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "2027662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027662" }, { "category": "external", "summary": "2028408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028408" }, { "category": "external", "summary": "2030195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030195" }, { "category": "external", "summary": "2039045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039045" }, { "category": "external", "summary": "2052697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052697" }, { "category": "external", "summary": "2053990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053990" }, { "category": "external", "summary": "2055313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055313" }, { "category": "external", "summary": "2059666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059666" }, { "category": "external", "summary": "2062697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062697" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2066145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066145" }, { "category": "external", "summary": "2068006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068006" }, { "category": "external", "summary": "2072452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072452" }, { "category": "external", "summary": "2073958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073958" }, { "category": "external", "summary": "2078925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078925" }, { "category": "external", "summary": "2079759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079759" }, { "category": "external", "summary": "2079761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079761" }, { "category": "external", "summary": "2081836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081836" }, { "category": "external", "summary": "2083570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083570" }, { "category": "external", "summary": "2083997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083997" }, { "category": "external", "summary": "2085361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085361" }, { "category": "external", "summary": "2086398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086398" }, { "category": "external", "summary": "2086757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086757" }, { "category": "external", "summary": "2090609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090609" }, { "category": "external", "summary": "2090920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090920" }, { "category": "external", "summary": "2093079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093079" }, { "category": "external", "summary": "2094610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094610" }, { "category": "external", "summary": "2094875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094875" }, { "category": "external", "summary": "2095097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095097" }, { "category": "external", "summary": "2096264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096264" }, { "category": "external", "summary": "2097865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097865" }, { "category": "external", "summary": "2100740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100740" }, { "category": "external", "summary": "2102140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102140" }, { "category": "external", "summary": "2102361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102361" }, { "category": "external", "summary": "2102381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102381" }, { "category": "external", "summary": "2113941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113941" }, { "category": "external", "summary": "2117699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117699" }, { "category": "external", "summary": "2117928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117928" }, { "category": "external", "summary": "2118231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118231" }, { "category": "external", "summary": "2119072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119072" }, { "category": "external", "summary": "2120651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120651" }, { "category": "external", "summary": "2121453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121453" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_7457.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-09-18T14:41:40+00:00", "generator": { "date": "2024-09-18T14:41:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:7457", "initial_release_date": "2022-11-08T09:27:39+00:00", "revision_history": [ { "date": "2022-11-08T09:27:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-08T09:27:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:41:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8070020220929222448:39077419", "product": { "name": "container-tools:rhel8:8070020220929222448:39077419", "product_id": "container-tools:rhel8:8070020220929222448:39077419", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8070020220929222448:39077419" } } }, { "category": "product_version", "name": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "product": { "name": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "product_id": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@53-1.module%2Bel8.7.0%2B16772%2B33343656?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "product": { "name": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "product_id": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "product": { "name": "podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "product_id": "podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=noarch\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "product": { "name": "python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "product_id": "python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-podman@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=noarch" } } }, { "category": "product_version", "name": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "product": { "name": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "product_id": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.6-3.module%2Bel8.7.0%2B16772%2B33343656?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "product_id": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.1.0-4.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "product_id": "containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "product_id": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.1.0-6.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_id": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_id": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product_id": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_id": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_id": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_id": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "product": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "product_id": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.1.0-4.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "product": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "product_id": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "product": { "name": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "product_id": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@53-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "product": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "product_id": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "product": { "name": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "product_id": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "product": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "product_id": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "product": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "product_id": "containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "product": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "product_id": "criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "product": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "product_id": "crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "product": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "product_id": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "product": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "product_id": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.1.0-6.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "product": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "product_id": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "product": { "name": "python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "product_id": "python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "product": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "product_id": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "product": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "product_id": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "product": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "product_id": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "product": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "product_id": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } }, { "category": "product_version", "name": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src", "product": { "name": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src", "product_id": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.6-3.module%2Bel8.7.0%2B16772%2B33343656?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "product_id": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.1.0-4.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "product_id": "containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "product_id": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.1.0-6.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_id": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_id": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_id": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_id": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_id": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_id": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "product": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "product_id": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.1.0-4.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_id": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_id": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_id": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product_id": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "product": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "product_id": "containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product_id": "crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product_id": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product_id": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "product": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "product_id": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.1.0-6.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_id": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_id": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_id": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_id": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_id": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_id": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_id": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_id": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_id": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product_id": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_id": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_id": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_id": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "product_id": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.1.0-4.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "product_id": "containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "product_id": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.1.0-6.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_id": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.4-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_id": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.2-1.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product_id": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-2.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_id": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_id": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_id": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.6.module%2Bel8.7.0%2B16772%2B33343656?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, "product_reference": "container-tools:rhel8:8070020220929222448:39077419", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src" }, "product_reference": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src" }, "product_reference": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch" }, "product_reference": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch" }, "product_reference": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src" }, "product_reference": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src" }, "product_reference": "containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src" }, "product_reference": "criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src" }, "product_reference": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch" }, "product_reference": "podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch" }, "product_reference": "python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src" }, "product_reference": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src" }, "product_reference": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src" }, "product_reference": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64 as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch" }, "product_reference": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src as a component of container-tools:rhel8:8070020220929222448:39077419 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" }, "product_reference": "udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src", "relates_to_product_reference": "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7457" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-41190", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024938" } ], "notes": [ { "category": "description", "text": "The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Image Specification, the manifest and index documents were not self-describing and documents with a single digest could be interpreted as either a manifest or an index. In the OCI Image Specification version 1.0.1 there is specified a recommendation that both manifest and index documents contain a `mediaType` field to identify the type of document.", "title": "Vulnerability description" }, { "category": "summary", "text": "opencontainers: OCI manifest and index parsing confusion", "title": "Vulnerability summary" }, { "category": "other", "text": "As a consequence of the OCI Image Specification (and OCI Distribution Specification [1]), container runtime engines (like containerd, moby - Docker Engine, cri-o) deliver updates to adopt new `mediaType` field used for identification of the document type. Even though some Red Hat products rely on container engine, the impact by this issue is LOW.\n\n[1] https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41190" }, { "category": "external", "summary": "RHBZ#2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190" }, { "category": "external", "summary": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42", "url": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42" }, { "category": "external", "summary": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "url": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m" }, { "category": "external", "summary": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh", "url": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh" } ], "release_date": "2021-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7457" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "opencontainers: OCI manifest and index parsing confusion" }, { "acknowledgments": [ { "names": [ "Adam Korcz and David Korczynski" ], "organization": "Disclosed by Ada Logics in a security audit sponsored by CNCF and facilitated by OSTIF" } ], "cve": "CVE-2022-1708", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-05-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085361" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "cri-o: memory exhaustion on the node when access to the kube api", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1708" }, { "category": "external", "summary": "RHBZ#2085361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1708", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1708" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1708", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1708" }, { "category": "external", "summary": "https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j", "url": "https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j" } ], "release_date": "2022-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7457" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cri-o: memory exhaustion on the node when access to the kube api" }, { "acknowledgments": [ { "names": [ "Steven Murdoch" ] } ], "cve": "CVE-2022-2990", "cwe": { "id": "CWE-842", "name": "Placement of User into Incorrect Group" }, "discovery_date": "2022-08-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121453" } ], "notes": [ { "category": "description", "text": "An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.", "title": "Vulnerability description" }, { "category": "summary", "text": "buildah: possible information disclosure and modification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2990" }, { "category": "external", "summary": "RHBZ#2121453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2990", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2990" }, { "category": "external", "summary": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/", "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/" } ], "release_date": "2022-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7457" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "buildah: possible information disclosure and modification" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7457" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" }, { "cve": "CVE-2022-29162", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "discovery_date": "2022-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2086398" } ], "notes": [ { "category": "description", "text": "A flaw was found in runc, where runc exec --cap executed processes with non-empty inheritable Linux process capabilities. This issue creates an atypical Linux environment and enables programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).", "title": "Vulnerability description" }, { "category": "summary", "text": "runc: incorrect handling of inheritable capabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29162" }, { "category": "external", "summary": "RHBZ#2086398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086398" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29162", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29162" }, { "category": "external", "summary": "https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66", "url": "https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66" } ], "release_date": "2022-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7457" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:aardvark-dns-2:1.1.0-4.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-debugsource-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:buildah-tests-debuginfo-1:1.27.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:cockpit-podman-0:53-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debuginfo-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:conmon-debugsource-3:2.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:container-selinux-2:2.189.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debuginfo-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containernetworking-plugins-debugsource-1:1.1.1-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:containers-common-2:1-40.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crit-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-debugsource-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-devel-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:criu-libs-debuginfo-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debuginfo-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:crun-debugsource-0:1.5-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:fuse-overlayfs-debugsource-0:1.9-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debuginfo-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-debugsource-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:libslirp-devel-0:4.4.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:netavark-2:1.1.0-6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-catatonit-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-debugsource-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-docker-3:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-gvproxy-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-plugins-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-remote-debuginfo-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:podman-tests-3:4.2.0-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-criu-0:3.15-3.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:python3-podman-0:4.2.0-1.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debuginfo-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:runc-debugsource-1:1.1.4-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debuginfo-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-debugsource-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:skopeo-tests-2:1.9.2-1.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debuginfo-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:slirp4netns-debugsource-0:1.2.0-2.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.src", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debuginfo-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-debugsource-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.aarch64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.ppc64le", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.s390x", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:toolbox-tests-0:0.0.99.3-0.6.module+el8.7.0+16772+33343656.x86_64", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.noarch", "AppStream-8.7.0.GA:container-tools:rhel8:8070020220929222448:39077419:udica-0:0.2.6-3.module+el8.7.0+16772+33343656.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "runc: incorrect handling of inheritable capabilities" } ] }
rhsa-2022_0855
Vulnerability from csaf_redhat
Published
2022-03-14 10:21
Modified
2024-09-18 04:22
Summary
Red Hat Security Advisory: OpenShift sandboxed containers 1.2.0 security update
Notes
Topic
OpenShift sandboxed containers 1.2.0 is now available.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.
Details
OpenShift sandboxed containers support for OpenShift Container Platform
provides users with built-in support for running Kata containers as an
additional, optional runtime.
This advisory contains an update for OpenShift sandboxed containers with enhancements, security updates, and bug fixes.
Space precludes documenting all of the updates to OpenShift sandboxed
containers in this advisory. See the following Release Notes documentation,
which will be updated shortly for this release, for details about these
changes:
https://docs.openshift.com/container-platform/4.10/sandboxed_containers/sandboxed-containers-release-notes.html
Security Fixes:
* net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "OpenShift sandboxed containers 1.2.0 is now available.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift sandboxed containers support for OpenShift Container Platform\nprovides users with built-in support for running Kata containers as an\nadditional, optional runtime.\n\nThis advisory contains an update for OpenShift sandboxed containers with enhancements, security updates, and bug fixes.\n\nSpace precludes documenting all of the updates to OpenShift sandboxed\ncontainers in this advisory. See the following Release Notes documentation,\nwhich will be updated shortly for this release, for details about these\nchanges:\n\nhttps://docs.openshift.com/container-platform/4.10/sandboxed_containers/sandboxed-containers-release-notes.html\n\nSecurity Fixes:\n\n* net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issues, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0855", "url": "https://access.redhat.com/errata/RHSA-2022:0855" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2073310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0855.json" } ], "title": "Red Hat Security Advisory: OpenShift sandboxed containers 1.2.0 security update", "tracking": { "current_release_date": "2024-09-18T04:22:13+00:00", "generator": { "date": "2024-09-18T04:22:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0855", "initial_release_date": "2022-03-14T10:21:41+00:00", "revision_history": [ { "date": "2022-03-14T10:21:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-14T10:21:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:22:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Sandboxed Containers 1.2.0", "product": { "name": "OpenShift Sandboxed Containers 1.2.0", "product_id": "8Base-OSE-OSC-1.2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_sandboxed_containers:1.2.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "product": { "name": "openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "product_id": "openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "product_identification_helper": { "purl": "pkg:oci/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel8\u0026tag=1.2.0-9" } } }, { "category": "product_version", "name": "openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "product": { "name": "openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "product_id": "openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "product_identification_helper": { "purl": "pkg:oci/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel8\u0026tag=1.2.0-10" } } }, { "category": "product_version", "name": "openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64", "product": { "name": "openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64", "product_id": "openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64", "product_identification_helper": { "purl": "pkg:oci/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle\u0026tag=1.2.0-19" } } }, { "category": "product_version", "name": "openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64", "product": { "name": "openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64", "product_id": "openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64", "product_identification_helper": { "purl": "pkg:oci/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers/osc-rhel8-operator\u0026tag=1.2.0-14" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64 as a component of OpenShift Sandboxed Containers 1.2.0", "product_id": "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64" }, "product_reference": "openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "relates_to_product_reference": "8Base-OSE-OSC-1.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64 as a component of OpenShift Sandboxed Containers 1.2.0", "product_id": "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64" }, "product_reference": "openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "relates_to_product_reference": "8Base-OSE-OSC-1.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64 as a component of OpenShift Sandboxed Containers 1.2.0", "product_id": "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64" }, "product_reference": "openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64", "relates_to_product_reference": "8Base-OSE-OSC-1.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64 as a component of OpenShift Sandboxed Containers 1.2.0", "product_id": "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" }, "product_reference": "openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64", "relates_to_product_reference": "8Base-OSE-OSC-1.2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ], "known_not_affected": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://docs.openshift.com/container-platform/latest/sandboxed_containers/upgrade-sandboxed-containers.html", "product_ids": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0855" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ], "known_not_affected": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://docs.openshift.com/container-platform/latest/sandboxed_containers/upgrade-sandboxed-containers.html", "product_ids": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0855" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-monitor-rhel8@sha256:7a93384fe78dd82d8f754f1fd520880241a8467290c3a6fb50bb1cd748c80667_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-must-gather-rhel8@sha256:f8ec9adb6535f770e4f9bfcfb037ee34619cdb731e9f8db0cd1abb814111156b_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-operator-bundle@sha256:54495b1d987c9381ecfb79f2401c8d4ca8aa7fa7616b25ff36db103bd75339e1_amd64", "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSE-OSC-1.2.0:openshift-sandboxed-containers/osc-rhel8-operator@sha256:ab9adc006067bdb848ce2a87649905e329f3f7b3c633700731285cd4d3408611_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" } ] }
rhsa-2022_1361
Vulnerability from csaf_redhat
Published
2022-04-13 15:33
Modified
2024-09-18 04:47
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement&bugfix update
Notes
Topic
Updated images that include numerous enhancements, security, and bug fixes
are now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
Bug Fix(es):
These updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
or more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes\nare now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nBug Fix(es):\n\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.\n\nor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1361", "url": "https://access.redhat.com/errata/RHSA-2022:1361" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2026342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026342" }, { "category": "external", "summary": "2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_1361.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement\u0026bugfix update", "tracking": { "current_release_date": "2024-09-18T04:47:46+00:00", "generator": { "date": "2024-09-18T04:47:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:1361", "initial_release_date": "2022-04-13T15:33:28+00:00", "revision_history": [ { "date": "2022-04-13T15:33:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-13T15:33:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:47:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHODF 4.10 for RHEL 8", "product": { "name": "RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.10::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.10.0-72.el8.src", "product": { "name": "mcg-0:5.10.0-72.el8.src", "product_id": "mcg-0:5.10.0-72.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.10.0-72.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.10.0-72.el8.x86_64", "product": { "name": "mcg-0:5.10.0-72.el8.x86_64", "product_id": "mcg-0:5.10.0-72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.10.0-72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mcg-redistributable-0:5.10.0-72.el8.x86_64", "product": { "name": "mcg-redistributable-0:5.10.0-72.el8.x86_64", "product_id": "mcg-redistributable-0:5.10.0-72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg-redistributable@5.10.0-72.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.10.0-72.el8.ppc64le", "product": { "name": "mcg-0:5.10.0-72.el8.ppc64le", "product_id": "mcg-0:5.10.0-72.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.10.0-72.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.10.0-72.el8.s390x", "product": { "name": "mcg-0:5.10.0-72.el8.s390x", "product_id": "mcg-0:5.10.0-72.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.10.0-72.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.10.0-72.el8.ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le" }, "product_reference": "mcg-0:5.10.0-72.el8.ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.10.0-72.el8.s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x" }, "product_reference": "mcg-0:5.10.0-72.el8.s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.10.0-72.el8.src as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src" }, "product_reference": "mcg-0:5.10.0-72.el8.src", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.10.0-72.el8.x86_64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64" }, "product_reference": "mcg-0:5.10.0-72.el8.x86_64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-redistributable-0:5.10.0-72.el8.x86_64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" }, "product_reference": "mcg-redistributable-0:5.10.0-72.el8.x86_64", "relates_to_product_reference": "8Base-RHODF-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1361" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1361" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1361" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.ppc64le", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.s390x", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.src", "8Base-RHODF-4.10:mcg-0:5.10.0-72.el8.x86_64", "8Base-RHODF-4.10:mcg-redistributable-0:5.10.0-72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2022_0557
Vulnerability from csaf_redhat
Published
2022-02-23 12:47
Modified
2024-09-18 14:40
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.9.22 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0557", "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0557.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update", "tracking": { "current_release_date": "2024-09-18T14:40:00+00:00", "generator": { "date": "2024-09-18T14:40:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0557", "initial_release_date": "2022-02-23T12:47:14+00:00", "revision_history": [ { "date": "2022-02-23T12:47:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-23T12:47:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:40:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "product": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.src", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.src", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.src", "product": { "name": "cri-tools-0:1.22.0-2.el8.src", "product_id": "cri-tools-0:1.22.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "product": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.src", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.src", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.x86_64", "product": { "name": "cri-tools-0:1.22.0-2.el8.x86_64", "product_id": "cri-tools-0:1.22.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "product": { "name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "product_id": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-redistributable@0.13.1-2.rhaos4.9.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.aarch64", "product": { "name": "cri-tools-0:1.22.0-2.el8.aarch64", "product_id": "cri-tools-0:1.22.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.ppc64le", "product": { "name": "cri-tools-0:1.22.0-2.el8.ppc64le", "product_id": "cri-tools-0:1.22.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.s390x", "product": { "name": "cri-tools-0:1.22.0-2.el8.s390x", "product_id": "cri-tools-0:1.22.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch" }, "product_reference": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64" }, "product_reference": "cri-tools-0:1.22.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le" }, "product_reference": "cri-tools-0:1.22.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x" }, "product_reference": "cri-tools-0:1.22.0-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src" }, "product_reference": "cri-tools-0:1.22.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64" }, "product_reference": "cri-tools-0:1.22.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2022_0947
Vulnerability from csaf_redhat
Published
2022-03-16 15:45
Modified
2024-09-18 14:40
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.10.0 images:
RHEL-8-CNV-4.10
==============
kubevirt-velero-plugin-container-v4.10.0-8
virtio-win-container-v4.10.0-10
kubevirt-template-validator-container-v4.10.0-16
hostpath-csi-driver-container-v4.10.0-32
hostpath-provisioner-container-v4.10.0-32
hostpath-provisioner-operator-container-v4.10.0-62
cnv-must-gather-container-v4.10.0-110
virt-cdi-controller-container-v4.10.0-90
virt-cdi-apiserver-container-v4.10.0-90
virt-cdi-uploadserver-container-v4.10.0-90
virt-cdi-uploadproxy-container-v4.10.0-90
virt-cdi-operator-container-v4.10.0-90
virt-cdi-cloner-container-v4.10.0-90
virt-cdi-importer-container-v4.10.0-90
kubevirt-ssp-operator-container-v4.10.0-50
virt-api-container-v4.10.0-217
hyperconverged-cluster-webhook-container-v4.10.0-133
libguestfs-tools-container-v4.10.0-217
virt-handler-container-v4.10.0-217
virt-launcher-container-v4.10.0-217
virt-artifacts-server-container-v4.10.0-217
virt-controller-container-v4.10.0-217
node-maintenance-operator-container-v4.10.0-48
hyperconverged-cluster-operator-container-v4.10.0-133
virt-operator-container-v4.10.0-217
cnv-containernetworking-plugins-container-v4.10.0-49
kubemacpool-container-v4.10.0-49
bridge-marker-container-v4.10.0-49
ovs-cni-marker-container-v4.10.0-49
ovs-cni-plugin-container-v4.10.0-49
kubernetes-nmstate-handler-container-v4.10.0-49
cluster-network-addons-operator-container-v4.10.0-49
hco-bundle-registry-container-v4.10.0-696
Security Fix(es):
* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.10.0 images:\n\nRHEL-8-CNV-4.10\n\n==============\n\nkubevirt-velero-plugin-container-v4.10.0-8\nvirtio-win-container-v4.10.0-10\nkubevirt-template-validator-container-v4.10.0-16\nhostpath-csi-driver-container-v4.10.0-32\nhostpath-provisioner-container-v4.10.0-32\nhostpath-provisioner-operator-container-v4.10.0-62\ncnv-must-gather-container-v4.10.0-110\nvirt-cdi-controller-container-v4.10.0-90\nvirt-cdi-apiserver-container-v4.10.0-90\nvirt-cdi-uploadserver-container-v4.10.0-90\nvirt-cdi-uploadproxy-container-v4.10.0-90\nvirt-cdi-operator-container-v4.10.0-90\nvirt-cdi-cloner-container-v4.10.0-90\nvirt-cdi-importer-container-v4.10.0-90\nkubevirt-ssp-operator-container-v4.10.0-50\nvirt-api-container-v4.10.0-217\nhyperconverged-cluster-webhook-container-v4.10.0-133\nlibguestfs-tools-container-v4.10.0-217\nvirt-handler-container-v4.10.0-217\nvirt-launcher-container-v4.10.0-217\nvirt-artifacts-server-container-v4.10.0-217\nvirt-controller-container-v4.10.0-217\nnode-maintenance-operator-container-v4.10.0-48\nhyperconverged-cluster-operator-container-v4.10.0-133\nvirt-operator-container-v4.10.0-217\ncnv-containernetworking-plugins-container-v4.10.0-49\nkubemacpool-container-v4.10.0-49\nbridge-marker-container-v4.10.0-49\novs-cni-marker-container-v4.10.0-49\novs-cni-plugin-container-v4.10.0-49\nkubernetes-nmstate-handler-container-v4.10.0-49\ncluster-network-addons-operator-container-v4.10.0-49\nhco-bundle-registry-container-v4.10.0-696\n\nSecurity Fix(es):\n\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0947", "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1760028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760028" }, { "category": "external", "summary": "1855182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1855182" }, { "category": "external", "summary": "1906151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906151" }, { "category": "external", "summary": "1918294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918294" }, { "category": "external", "summary": "1935217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935217" }, { "category": "external", "summary": "1945586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945586" }, { "category": "external", "summary": "1958085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958085" }, { "category": "external", "summary": "1959039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959039" }, { "category": "external", "summary": "1975978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975978" }, { "category": "external", "summary": "1983079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983079" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1986970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986970" }, { "category": "external", "summary": "1987009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987009" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990061" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1992231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992231" }, { "category": "external", "summary": "1993454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993454" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1997540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997540" }, { "category": "external", "summary": "1998300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998300" }, { "category": "external", "summary": "1999110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999110" }, { "category": "external", "summary": "1999636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999636" }, { "category": "external", "summary": "2000480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000480" }, { "category": "external", "summary": "2001984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001984" }, { "category": "external", "summary": "2001987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001987" }, { "category": "external", "summary": "2002272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002272" }, { "category": "external", "summary": "2003704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003704" }, { "category": "external", "summary": "2007397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007397" }, { "category": "external", "summary": "2008140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008140" }, { "category": "external", "summary": "2008411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008411" }, { "category": "external", "summary": "2008938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008938" }, { "category": "external", "summary": "2008949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008949" }, { "category": "external", "summary": "2008975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008975" }, { "category": "external", "summary": "2010540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010540" }, { "category": "external", "summary": "2010908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010908" }, { "category": "external", "summary": "2012920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012920" }, { "category": "external", "summary": "2013160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013160" }, { "category": "external", "summary": "2013455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013455" }, { "category": "external", "summary": "2015327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015327" }, { "category": "external", "summary": "2017255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017255" }, { "category": "external", "summary": "2018457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018457" }, { "category": "external", "summary": "2018925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018925" }, { "category": "external", "summary": "2018970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018970" }, { "category": "external", "summary": "2019053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019053" }, { "category": "external", "summary": "2021992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021992" }, { "category": "external", "summary": "2025295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025295" }, { "category": "external", "summary": "2025750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025750" }, { "category": "external", "summary": "2025878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025878" }, { "category": "external", "summary": "2026336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026336" }, { "category": "external", "summary": "2026363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026363" }, { "category": "external", "summary": "2026665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026665" }, { "category": "external", "summary": "2026667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026667" }, { "category": "external", "summary": "2027420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027420" }, { "category": "external", "summary": "2027922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027922" }, { "category": "external", "summary": "2029343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029343" }, { "category": "external", "summary": "2029767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029767" }, { "category": "external", "summary": "2030660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030660" }, { "category": "external", "summary": "2030686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030686" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "2031033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031033" }, { "category": "external", "summary": "2031688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031688" }, { "category": "external", "summary": "2031727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031727" }, { "category": "external", "summary": "2031919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031919" }, { "category": "external", "summary": "2032045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032045" }, { "category": "external", "summary": "2032845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032845" }, { "category": "external", "summary": "2032873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032873" }, { "category": "external", "summary": "2032876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032876" }, { "category": "external", "summary": "2033240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033240" }, { "category": "external", "summary": "2033252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033252" }, { "category": "external", "summary": "2034544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034544" }, { "category": "external", "summary": "2035008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035008" }, { "category": "external", "summary": "2035324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035324" }, { "category": "external", "summary": "2035658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035658" }, { "category": "external", "summary": "2035677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035677" }, { "category": "external", "summary": "2036220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036220" }, { "category": "external", "summary": "2036483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036483" }, { "category": "external", "summary": "2036605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036605" }, { "category": "external", "summary": "2037270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037270" }, { "category": "external", "summary": "2037290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037290" }, { "category": "external", "summary": "2037312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037312" }, { "category": "external", "summary": "2037421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037421" }, { "category": "external", "summary": "2038679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038679" }, { "category": "external", "summary": "2038825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038825" }, { "category": "external", "summary": "2038831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038831" }, { "category": "external", "summary": "2038985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038985" }, { "category": "external", "summary": "2039196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039196" }, { "category": "external", "summary": "2039208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039208" }, { "category": "external", "summary": "2039489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039489" }, { "category": "external", "summary": "2039683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039683" }, { "category": "external", "summary": "2039686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039686" }, { "category": "external", "summary": "2039691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039691" }, { "category": "external", "summary": "2040113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040113" }, { "category": "external", "summary": "2040115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040115" }, { "category": "external", "summary": "2041519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041519" }, { "category": "external", "summary": "2041530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041530" }, { "category": "external", "summary": "2042139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042139" }, { "category": "external", "summary": "2042799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042799" }, { "category": "external", "summary": "2042842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042842" }, { "category": "external", "summary": "2042856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042856" }, { "category": "external", "summary": "2042880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042880" }, { "category": "external", "summary": "2042908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042908" }, { "category": "external", "summary": "2044348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044348" }, { "category": "external", "summary": "2044398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044398" }, { "category": "external", "summary": "2046271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046271" }, { "category": "external", "summary": "2048227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048227" }, { "category": "external", "summary": "2048275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048275" }, { "category": "external", "summary": "2051105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051105" }, { "category": "external", "summary": "2051693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051693" }, { "category": "external", "summary": "2051968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051968" }, { "category": "external", "summary": "2052489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052489" }, { "category": "external", "summary": "2053027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053027" }, { "category": "external", "summary": "2058167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058167" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0947.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update", "tracking": { "current_release_date": "2024-09-18T14:40:11+00:00", "generator": { "date": "2024-09-18T14:40:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0947", "initial_release_date": "2022-03-16T15:45:58+00:00", "revision_history": [ { "date": "2022-03-16T15:45:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-16T15:45:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:40:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.10 for RHEL 8", "product": { "name": "CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.10::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.10.0-110" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.10.0-696" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.10.0-62" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.10.0-133" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.10.0-133" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.10.0-50" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.10.0-48" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product_id": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.10.0-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.10.0-217" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2022_0577
Vulnerability from csaf_redhat
Published
2022-03-28 09:34
Modified
2024-09-18 14:40
Summary
Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]
Notes
Topic
The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0577", "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990573" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1992841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992841" }, { "category": "external", "summary": "1994859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994859" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2000772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000772" }, { "category": "external", "summary": "2001547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001547" }, { "category": "external", "summary": "2002961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002961" }, { "category": "external", "summary": "2005360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005360" }, { "category": "external", "summary": "2008601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008601" }, { "category": "external", "summary": "2015772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015772" }, { "category": "external", "summary": "2032048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032048" }, { "category": "external", "summary": "WINC-747", "url": "https://issues.redhat.com/browse/WINC-747" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0577.json" } ], "title": "Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]", "tracking": { "current_release_date": "2024-09-18T14:40:51+00:00", "generator": { "date": "2024-09-18T14:40:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0577", "initial_release_date": "2022-03-28T09:34:15+00:00", "revision_history": [ { "date": "2022-03-28T09:34:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T09:34:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:40:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product": { "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product_id": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product_identification_helper": { "purl": "pkg:oci/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle\u0026tag=v5.0.0-5" } } }, { "category": "product_version", "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product": { "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product_id": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product_identification_helper": { "purl": "pkg:oci/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator\u0026tag=5.0.0-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64" }, "product_reference": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" }, "product_reference": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2022_1372
Vulnerability from csaf_redhat
Published
2022-04-13 18:48
Modified
2024-09-18 14:41
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security & bug fix update
Notes
Topic
Updated images that include numerous enhancements, security, and bug fixes
are now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
Bug Fix(es):
These updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
or more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes\nare now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nBug Fix(es):\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.\n\nor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1372", "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1898988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898988" }, { "category": "external", "summary": "1954708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954708" }, { "category": "external", "summary": "1956418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956418" }, { "category": "external", "summary": "1970123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970123" }, { "category": "external", "summary": "1972190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972190" }, { "category": "external", "summary": "1974344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974344" }, { "category": "external", "summary": "1981341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981341" }, { "category": "external", "summary": "1981694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981694" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1991462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991462" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1996830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996830" }, { "category": "external", "summary": "1996833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996833" }, { "category": "external", "summary": "1999689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999689" }, { "category": "external", "summary": "1999952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999952" }, { "category": "external", "summary": "2003532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003532" }, { "category": "external", "summary": "2005801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005801" }, { "category": "external", "summary": "2005919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005919" }, { "category": "external", "summary": "2021313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021313" }, { "category": "external", "summary": "2022424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022424" }, { "category": "external", "summary": "2022693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022693" }, { "category": "external", "summary": "2024107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024107" }, { "category": "external", "summary": "2024545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024545" }, { "category": "external", "summary": "2026007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026007" }, { "category": "external", "summary": "2027666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027666" }, { "category": "external", "summary": "2027826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027826" }, { "category": "external", "summary": "2028559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028559" }, { "category": "external", "summary": "2029413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029413" }, { "category": "external", "summary": "2030602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030602" }, { "category": "external", "summary": "2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "2030839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030839" }, { "category": "external", "summary": "2031023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031023" }, { "category": "external", "summary": "2031705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031705" }, { "category": "external", "summary": "2032404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032404" }, { "category": "external", "summary": "2032412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032412" }, { "category": "external", "summary": "2032656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032656" }, { "category": "external", "summary": "2032969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032969" }, { "category": "external", "summary": "2032984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032984" }, { "category": "external", "summary": "2033251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033251" }, { "category": "external", "summary": "2034003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034003" }, { "category": "external", "summary": "2034805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034805" }, { "category": "external", "summary": "2034904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034904" }, { "category": "external", "summary": "2035774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035774" }, { "category": "external", "summary": "2035995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035995" }, { "category": "external", "summary": "2036018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036018" }, { "category": "external", "summary": "2036211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036211" }, { "category": "external", "summary": "2037279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037279" }, { "category": "external", "summary": "2037318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037318" }, { "category": "external", "summary": "2037497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037497" }, { "category": "external", "summary": "2038884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038884" }, { "category": "external", "summary": "2039240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039240" }, { "category": "external", "summary": "2040682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040682" }, { "category": "external", "summary": "2041507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041507" }, { "category": "external", "summary": "2042866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042866" }, { "category": "external", "summary": "2043017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043017" }, { "category": "external", "summary": "2043028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043028" }, { "category": "external", "summary": "2043406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043406" }, { "category": "external", "summary": "2043513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043513" }, { "category": "external", "summary": "2044447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044447" }, { "category": "external", "summary": "2044823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044823" }, { "category": "external", "summary": "2045084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045084" }, { "category": "external", "summary": "2046186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046186" }, { "category": "external", "summary": "2046254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046254" }, { "category": "external", "summary": "2046677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046677" }, { "category": "external", "summary": "2046766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046766" }, { "category": "external", "summary": "2046887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046887" }, { "category": "external", "summary": "2047162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047162" }, { "category": "external", "summary": "2047201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047201" }, { "category": "external", "summary": "2047562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047562" }, { "category": "external", "summary": "2047565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047565" }, { "category": "external", "summary": "2047625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047625" }, { "category": "external", "summary": "2047632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047632" }, { "category": "external", "summary": "2047642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047642" }, { "category": "external", "summary": "2048107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048107" }, { "category": "external", "summary": "2048370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048370" }, { "category": "external", "summary": "2048458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048458" }, { "category": "external", "summary": "2049029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049029" }, { "category": "external", "summary": "2049075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049075" }, { "category": "external", "summary": "2049081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049081" }, { "category": "external", "summary": "2049424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049424" }, { "category": "external", "summary": "2049509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049509" }, { "category": "external", "summary": "2049718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049718" }, { "category": "external", "summary": "2049727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049727" }, { "category": "external", "summary": "2049771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049771" }, { "category": "external", "summary": "2049790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049790" }, { "category": "external", "summary": "2050056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050056" }, { "category": "external", "summary": "2050142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050142" }, { "category": "external", "summary": "2050402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050402" }, { "category": "external", "summary": "2050483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050483" }, { "category": "external", "summary": "2051249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051249" }, { "category": "external", "summary": "2051406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051406" }, { "category": "external", "summary": "2051599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051599" }, { "category": "external", "summary": "2051913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051913" }, { "category": "external", "summary": "2052027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052027" }, { "category": "external", "summary": "2052438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052438" }, { "category": "external", "summary": "2052937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052937" }, { "category": "external", "summary": "2052996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052996" }, { "category": "external", "summary": "2053156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053156" }, { "category": "external", "summary": "2053517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053517" }, { "category": "external", "summary": "2054147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054147" }, { "category": "external", "summary": "2054755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054755" }, { "category": "external", "summary": "2061251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061251" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_1372.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security \u0026 bug fix update", "tracking": { "current_release_date": "2024-09-18T14:41:17+00:00", "generator": { "date": "2024-09-18T14:41:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:1372", "initial_release_date": "2022-04-13T18:48:58+00:00", "revision_history": [ { "date": "2022-04-13T18:48:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-13T18:48:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:41:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHODF 4.10 for RHEL 8", "product": { "name": "RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.10::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "product": { "name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "product_id": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "product": { "name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "product_id": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "product": { "name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "product_id": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "product_id": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "product_id": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "product_id": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "product_id": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "product": { "name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "product_id": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "product": { "name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "product_id": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "product": { "name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "product_id": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "product_id": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "product_id": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "product_id": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "product_id": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "product": { "name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "product_id": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "product": { "name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "product_id": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "product": { "name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "product_id": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "product_id": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "product_id": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64" }, "product_reference": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le" }, "product_reference": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x" }, "product_reference": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le" }, "product_reference": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64" }, "product_reference": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x" }, "product_reference": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2021_4766
Vulnerability from csaf_redhat
Published
2021-11-23 10:48
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.19.0
Notes
Topic
Release of OpenShift Serverless 1.19.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Serverless release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8 and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.19.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8 and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4766", "url": "https://access.redhat.com/errata/RHSA-2021:4766" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2016256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016256" }, { "category": "external", "summary": "2016258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016258" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_4766.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.19.0", "tracking": { "current_release_date": "2024-09-18T04:20:32+00:00", "generator": { "date": "2024-09-18T04:20:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:4766", "initial_release_date": "2021-11-23T10:48:14+00:00", "revision_history": [ { "date": "2021-11-23T10:48:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-23T10:48:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.19", "product": { "name": "Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.19::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.19.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.25.1-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.25.1-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.25.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.25.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.19.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.25.1-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.25.1-1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64 as a component of Red Hat OpenShift Serverless 1.19", "product_id": "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.19" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4766" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:3d8ff532bb268412458657053c9b94a8b100cf4a92e5c91003b663edabab3ad8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:b1add3d43f3af0e6244f917d7181c1b9a057e680107d609ca5f5f560dada9bdb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/client-kn-rhel8@sha256:c0f392e83e890d1fed9c74b7c69af2a25e35878b640f6d0d4f69d16617ba0d5e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1309b8c62b602688db246bd118d3980c8079d2cfc3705c77537257cd5526df23_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:162df2b7127f2401dc23545f6ad4f363833f0d0865bbfc40d4244bd191921c31_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:af0f842381c404d1bd70b7944c2362f9cf9c5d6384f25d474893c118be1b4c22_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:8e17ade162dbc724f6fa356a325c8659f2a666315fa63dbdddc55b1735e742cb_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:a2b521761cd5456f5c4e0ea631af1c0aff9cb63bc872e7cc508a15d5c0fb054b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-controller-rhel8@sha256:de7cc2b8385c87ded67bba003045957475f30ebc9f5ebc5762b702ca7a532b03_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:44bad77b6283f4f347712029800597b445ecd7b487e7aa140c1469f46ecd09f3_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:45c342dd6f7e476f88d883080526de028e73d9a80f40df6a6cca7e85e14d846c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d9fcc1fea2871ca3571f0dfaf980a5816721ffc9c974af7af11096392758d372_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:022d6e58373d02a5c5db6411472c3f9549ad3dd22f9fb0ac2bc9f9c761b9a14f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f6cc90833f798f3a5a7388f84a82a877152174ec5b16d2f5fe507a6224f74df6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:fead7ee90616a615a6c6bbcb097b3fc8f92f32161f1aa3af0985080a6a199634_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6cc3946f8a6e56d4450c4ce88010cc65bde6ecc0f812952ca87081b0287a4aea_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:85e5625e5c0f068426d1f33dadfd0100de5739311f4b56ee16d014cd3c1e46d8_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:bfc39ef7fc323777b08830ef76a3312636cfa98683071987139554ebee9f4e6e_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:51bfd5b56f0108195f9c47c10a268d5afbf87e672e890c782d3de3e7d709449d_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:7c138eedd7fef64422aed3bacf88abca1ae3e400df6c1d54f9a738bfea3c806f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:e82ba3d5b30c05fbbb09868131fcd1222142cd5314fb32e5b6ceb03f6516715d_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:a8d0e98a91d8341a540067fa730311b850dbab4b7e98df142df885ed41f7f0ab_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:ec50895694c979ee245eb3e8b79bf5a6a4e6bf2dbd2667cd01de1ab70f37ce8f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f2f344a37074276047bb90bac8ef47af201e900e61b98690e7f32eb32a0060f4_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:0913b8b6516fbae7e10a8e2132331776d63a4c704932aaba9ea6c8741ee59358_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:567e93d2d6937029638c1dd8e130b6185d7a5c067825149d356dabf5c7b03759_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-mtping-rhel8@sha256:a869eca8bc0a8fc7b2fcb540944405c4c9c7ae201a66b64134869dcd15acd8d1_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:0307315d77d547fba1af313eb250baef68b34f3554fe91e493a3ebf92c8d1d36_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:a721544740837da84a04cafe839b9ccb3c52851b99bd5e8ecf378ab5d6eb2a85_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:f60716fcb5fc590c5a3f5da1fbce185597bed58267dfed1f58c389387068b84a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:80d354f858e9ac5b0e397ba1094363574a3a3d2fda833d735270fe4336ef3e2f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c1b3f3fa08bda6a3d46fbea0e6a2bfec57c4974488264d52b240cfdbf2f4cb96_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:da2fe42f6469c05b290aa0cae7b11f1c40036f31a7a8f5b1654c1450023efc4b_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:408a63aeae122e98a1c1dbbf572e1d0c45a772804820a31e88d320d079d2e75a_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:494ba1f8e63d0c4f3206c03b5349879bcf1fa7b5f11c726384bf1d360f890b64_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/eventing-webhook-rhel8@sha256:95f4914aab211b2e96670bc30d2c76936539613bfab91d86d72b7a92160c91d1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:3806a94e4e1234c0e6c02dafe3d8b0459dbbc6870c92fd02ff7bacd344155c2c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:9814ff193492a9904cd84d2987a60ac2f10d6577e98c719f638aff577a993bd0_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/ingress-rhel8-operator@sha256:e027ef1376919bc2bfc2d6aa761787a95641a5149f963b2a705861fb02835a10_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:5d8a70d47918bdf1cd58d182e0cae9a4743f8263915145f09ec70343630914fa_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:71633fb13d4eec6e34b2713bee1d002f32124d55d47c0bf27d9e5f46f190aaeb_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a5f6eaed0a5fb050cc48be9d027974565d8a284a2059ca11c80021ee850e372f_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:1bf4d9db9434d648a54ccaede572c8afdbd433235890d6049adbf63ae7474422_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fa35a8e43841d6d2ca9b5488c04f2f18fa49fce8c4a77c2102867d81bd1d2376_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/knative-rhel8-operator@sha256:fe4e9d63a99380de225f8d49151f23da59d42bea28ed8b427f49c0f8c6ec7146_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:32751fbb41e0780c5d8ce707d416fb2a6e1b04422ef9ab82ef1a96e15e2f1aca_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:7ca9271557cdff0dbe3a8475d96bf04e6bf0495e56ee38b9647cdfe33475c2b3_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/kourier-control-rhel8@sha256:927dbb6fc7f20d3ff4dcd184f8ec6ae4191fd2e7410d81e3f861636bae9cd827_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:169372ee329ee696cc1caa42a784c1b93512dae4b8fa4aefa4b8101876efcba7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:1a22748da6014c5ae7f988eee302e5a9cffa192f9a510ee2801337de521d841c_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-controller-rhel8@sha256:e35ab28f7ae471f8a1fdc88e7a0391551f36ecc352da85fd07237ad499a432c1_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:284fe1e2a3f53a9f7966b83a36ec84e5bf08293729ad9e13ab9362b0b9b0daae_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:99ecd0e9685b4ee668007286afadafa318504ef4fa3a8bb689c2335dd6b8c316_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/net-istio-webhook-rhel8@sha256:d1bfac9272384db4f3e2c67afbcf84193ffa84738911c79f3a3f7e1773344812_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-operator-bundle@sha256:1f430f03bc8935c45ba346a715e600bf7ea88097f63902581c55b991edfdebb2_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:4a898f6db7586294eb8356dbff716ba8f2215330d7d5809bfb66f918f04dad08_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:ce22208bec16469664c738741d9cdfa229673a15b79db9b4469597a585a42a00_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serverless-rhel8-operator@sha256:d1213879a47ef86a1d53549f25a5e4d44862cabd43440e598a6d63ecc48e4074_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:8d95257f03d4539bd50f7ef40c1193599651ce085174ac9bba3a6e9f010a67c1_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:de971b819ee2851325a61ac6dfae927f72bc3a701bd3eb54d915df487604ca82_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-activator-rhel8@sha256:e0da6abfebb799a8aee871d493a1fe9b6aa3df659dea13fb8ff11b712bf10202_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8b08abcecabe1fa32718abf24044a05f86ead29b10e4cd49e75e44dcaed77179_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:dd045ef5a811318b2da02769adfda8348ad201a0cfd437ef51de447ecd7447ac_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f55f816565f6caf736fae7bf4d62011c7d32b1a1925acdfa7a2ab58aa5945fab_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:0647d440175276c8f702f1c7e1d6c3d00d5ebc93ccaa017f88813646ad2738a9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:1dcac8873dce5410fea58c8e2fd664d679014fd60cc91fdf05fac3bed762a510_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-autoscaler-rhel8@sha256:82a4cdb5fe2eba742920e8b07dd1ffbecde32b4c287a6d20ff76be6004803c5a_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:4ab2a6cf47a68c118c2c0edb883773f0f153aee179260ce26d792a582a124e66_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:826d2588cd50e1fa5931dc7a860eb845f5574b3c757593a775399fd78cd3079b_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-controller-rhel8@sha256:c11625fe209ca27fd4e6314bc01124dd0712357947562d140bb86fd99c322308_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0a96d3ed19fb96b3d3cb58734da1f805fff0e583a2935c5addedf8a1370f9e66_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a677ebe2f6977eeb61738ad76b35faa54bac6be8bde59146850adfc0aea78c0e_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:e2f08784d10d14f76b4532d7cda56e92d2a0540cbd1642e72a898710673dcd28_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:d028b9f6c6f3a80ac699477160158ffe79e02c7d26384e97738663f0c67f39b7_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:e6d1a71887b08e14cedaee0d0f8794850fbe69babfb34beb04774946857545e9_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f39db88462ce4224fa60320b1108a5fcbc653d33522e218a005e1caab6dd9183_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:655bd0885197a76aa34074d6c1836b3ce8ad169a0b0082cda827f46c8fe3e2e6_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:d5d91f7e69e7fda3f5487e774c74222592b67c525bb45ac2a058a24675182af2_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-queue-rhel8@sha256:f74fe711fae873631fc69805c757ac3373a547eecbf216ac38cbcb6825a2b4cc_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:06801d6dc746ea52fb16732b7eb51ecdabf3475bcabedac9958ac6b3c2e83747_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:3462d691129abafb89c63fcd9a81050022a830d5d6fbf327658f0ddb3e01d86f_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:a881b18751f593ec40ff116a1ea9fb939c5d8efc3bcd09dbef91d6e9f3a71e36_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:02cabd4fffd5e9c38e18b08bb81a5015da6e8ef9df270eb3e99590f37133e201_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:79f8834a9e7a9282217ebfbbe5834b6217d74b23c09e94cf4db2ebef49a78cad_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/serving-webhook-rhel8@sha256:fa06ea6f435e1d591d30eab3fe2d506dbab2cc6bc6667bc207685e42a1fa3d0c_amd64", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:2ea8f864a46995bfaaefbcb49f802c20dfdbbfbc1759b9a5fc8a810db6e5a605_ppc64le", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:457c3f2633955ddeed7137f978efaf381327d811118836cd9c9c74099ee89076_s390x", "8Base-Openshift-Serverless-1.19:openshift-serverless-1/svls-must-gather-rhel8@sha256:a5f1f7acec60e5269e3f8da25e74e539cd5fe43bc73fe0fc796227b66263cf03_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
wid-sec-w-2022-0970
Vulnerability from csaf_certbund
Published
2022-04-07 22:00
Modified
2024-05-21 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0970 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0970.json" }, { "category": "self", "summary": "WID-SEC-2022-0970 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0970" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4668 vom 2022-05-19", "url": "https://access.redhat.com/errata/RHSA-2022:4668" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-04-07", "url": "https://access.redhat.com/errata/RHSA-2022:1275" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-04-07", "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1679 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1679" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9362 vom 2022-05-09", "url": "https://linux.oracle.com/errata/ELSA-2022-9362.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-02 vom 2022-08-09", "url": "https://security.gentoo.org/glsa/202208-02" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7129 vom 2022-10-26", "url": "https://linux.oracle.com/errata/ELSA-2022-7129.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7129 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7129" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7457 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7457" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7954 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2303 vom 2023-10-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2303.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2944 vom 2024-05-21", "url": "https://access.redhat.com/errata/RHSA-2024:2944" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T08:37:47.134+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0970", "initial_release_date": "2022-04-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Container Platform 4", "product": { "name": "Red Hat OpenShift Container Platform 4", "product_id": "T022509", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4" } } }, { "category": "product_version_range", "name": "Service Mesh \u003c2.1.2", "product": { "name": "Red Hat OpenShift Service Mesh \u003c2.1.2", "product_id": "T022580", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh__2.1.2" } } }, { "category": "product_version_range", "name": "Service Mesh \u003c2.0.9", "product": { "name": "Red Hat OpenShift Service Mesh \u003c2.0.9", "product_id": "T022581", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh__2.0.9" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-28852", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2020-28852" }, { "cve": "CVE-2021-29482", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-29482" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-3121", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-3121" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-3749", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-3749" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-43824", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43824" }, { "cve": "CVE-2021-43825", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43825" }, { "cve": "CVE-2021-43826", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43826" }, { "cve": "CVE-2022-21654", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-21654" }, { "cve": "CVE-2022-21655", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-21655" }, { "cve": "CVE-2022-23606", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-23606" }, { "cve": "CVE-2022-23635", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-23635" }, { "cve": "CVE-2022-24726", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-24726" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
wid-sec-w-2022-1335
Vulnerability from csaf_certbund
Published
2022-09-07 22:00
Modified
2023-05-18 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1335 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json" }, { "category": "self", "summary": "WID-SEC-2022-1335 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-021 vom 2022-09-07", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:57:44.642+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1335", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2021-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-0561" }, { "cve": "CVE-2021-21708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-21708" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-30809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30897" }, { "cve": "CVE-2021-30934", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30934" }, { "cve": "CVE-2021-30936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30936" }, { "cve": "CVE-2021-30951", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30951" }, { "cve": "CVE-2021-30952", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30952" }, { "cve": "CVE-2021-30953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30953" }, { "cve": "CVE-2021-30954", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30954" }, { "cve": "CVE-2021-30984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30984" }, { "cve": "CVE-2021-3448", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-3448" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-4115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4115" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4217" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-45481", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45481" }, { "cve": "CVE-2021-45482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45482" }, { "cve": "CVE-2021-45483", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45483" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0156", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0156" }, { "cve": "CVE-2022-0158", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0158" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0408" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0417" }, { "cve": "CVE-2022-0443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0443" }, { "cve": "CVE-2022-0554", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0554" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0572" }, { "cve": "CVE-2022-0629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0629" }, { "cve": "CVE-2022-0685", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0685" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0714", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0714" }, { "cve": "CVE-2022-0729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0729" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1097" }, { "cve": "CVE-2022-1196", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1196" }, { "cve": "CVE-2022-1197", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1197" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1520", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1520" }, { "cve": "CVE-2022-1834", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1834" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21514", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21514" }, { "cve": "CVE-2022-21524", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21524" }, { "cve": "CVE-2022-21533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21533" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-22590", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22590" }, { "cve": "CVE-2022-22592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22592" }, { "cve": "CVE-2022-22620", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22620" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24130", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24130" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24713", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24713" }, { "cve": "CVE-2022-24801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24801" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25762" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26486" }, { "cve": "CVE-2022-28281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28281" }, { "cve": "CVE-2022-28282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28282" }, { "cve": "CVE-2022-28285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28285" }, { "cve": "CVE-2022-28286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28286" }, { "cve": "CVE-2022-28289", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28289" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28346", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28346" }, { "cve": "CVE-2022-28347", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28347" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-29909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29909" }, { "cve": "CVE-2022-29911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29911" }, { "cve": "CVE-2022-29912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29912" }, { "cve": "CVE-2022-29913", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29913" }, { "cve": "CVE-2022-29914", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29914" }, { "cve": "CVE-2022-29916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29916" }, { "cve": "CVE-2022-29917", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29917" }, { "cve": "CVE-2022-31736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31736" }, { "cve": "CVE-2022-31737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31737" }, { "cve": "CVE-2022-31738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31738" }, { "cve": "CVE-2022-31739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31739" }, { "cve": "CVE-2022-3174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-3174" }, { "cve": "CVE-2022-31740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31740" }, { "cve": "CVE-2022-31741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31741" }, { "cve": "CVE-2022-31742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31742" }, { "cve": "CVE-2022-31747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31747" }, { "cve": "CVE-2022-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-4187" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
ghsa-6qcx-qr4g-4fx9
Vulnerability from github
Published
2022-05-24 19:10
Modified
2022-06-15 00:00
Severity
Details
Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
{ "affected": [], "aliases": [ "CVE-2021-36221" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-08T06:15:00Z", "severity": "MODERATE" }, "details": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.", "id": "GHSA-6qcx-qr4g-4fx9", "modified": "2022-06-15T00:00:31Z", "published": "2022-05-24T19:10:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!forum/golang-announce" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4AMYYHGBYMIWCCR5RCDFI5RAUJOPO5L" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-02" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2021-36221
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-36221", "description": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.", "id": "GSD-2021-36221", "references": [ "https://www.suse.com/security/cve/CVE-2021-36221.html", "https://access.redhat.com/errata/RHSA-2022:0561", "https://access.redhat.com/errata/RHSA-2022:0557", "https://access.redhat.com/errata/RHSA-2022:0318", "https://access.redhat.com/errata/RHSA-2021:4766", "https://access.redhat.com/errata/RHSA-2021:4765", "https://access.redhat.com/errata/RHSA-2021:4156", "https://advisories.mageia.org/CVE-2021-36221.html", "https://security.archlinux.org/CVE-2021-36221", "https://access.redhat.com/errata/RHSA-2022:0577", "https://access.redhat.com/errata/RHSA-2022:0855", "https://access.redhat.com/errata/RHSA-2022:0947", "https://access.redhat.com/errata/RHSA-2022:1276", "https://access.redhat.com/errata/RHSA-2022:1361", "https://access.redhat.com/errata/RHSA-2022:1372", "https://access.redhat.com/errata/RHSA-2022:1396", "https://alas.aws.amazon.com/cve/html/CVE-2021-36221.html", "https://access.redhat.com/errata/RHSA-2022:4668", "https://access.redhat.com/errata/RHEA-2022:1596", "https://access.redhat.com/errata/RHSA-2022:7457" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-36221" ], "details": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.", "id": "GSD-2021-36221", "modified": "2023-12-13T01:23:16.397766Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36221", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/golang-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/golang-announce" }, { "name": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0" }, { "name": "FEDORA-2021-38b51d9fd3", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4AMYYHGBYMIWCCR5RCDFI5RAUJOPO5L/" }, { "name": "FEDORA-2021-6a3024b3fd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.16.7", "versionStartIncluding": "1.16.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.15.15", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.1.1.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36221" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0" }, { "name": "https://groups.google.com/forum/#!forum/golang-announce", "refsource": "MISC", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "https://groups.google.com/forum/#!forum/golang-announce" }, { "name": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" }, { "name": "FEDORA-2021-38b51d9fd3", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4AMYYHGBYMIWCCR5RCDFI5RAUJOPO5L/" }, { "name": "FEDORA-2021-6a3024b3fd", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2023-04-20T00:15Z", "publishedDate": "2021-08-08T06:15Z" } } }
Loading...