Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-4231
Vulnerability from cvelistv5
Published
2022-05-26 07:10
Modified
2024-08-03 17:23
Severity ?
EPSS score ?
Summary
A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component.
References
▼ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09 | Patch, Third Party Advisory | |
cna@vuldb.com | https://github.com/angular/angular/issues/40136 | Third Party Advisory | |
cna@vuldb.com | https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902 | Third Party Advisory | |
cna@vuldb.com | https://vuldb.com/?id.181356 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/angular/angular/issues/40136 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.181356 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | unspecified | Angular |
Version: 11.0.0 Version: 11.0.1 Version: 11.0.2 Version: 11.0.3 Version: 11.0.4 Version: 11.1.0-next.0 Version: 11.1.0-next.1 Version: 11.1.0-next.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:23:10.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/angular/angular/issues/40136" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.181356" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Angular", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.2" }, { "status": "affected", "version": "11.0.3" }, { "status": "affected", "version": "11.0.4" }, { "status": "affected", "version": "11.1.0-next.0" }, { "status": "affected", "version": "11.1.0-next.1" }, { "status": "affected", "version": "11.1.0-next.2" } ] } ], "credits": [ { "lang": "en", "value": "Mi\u0161ko Hevery" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross Site Scripting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-26T07:10:14", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/angular/angular/issues/40136" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.181356" } ], "title": "Angular Comment cross site scripting", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2021-4231", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Angular Comment cross site scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Angular", "version": { "version_data": [ { "version_value": "11.0.0" }, { "version_value": "11.0.1" }, { "version_value": "11.0.2" }, { "version_value": "11.0.3" }, { "version_value": "11.0.4" }, { "version_value": "11.1.0-next.0" }, { "version_value": "11.1.0-next.1" }, { "version_value": "11.1.0-next.2" } ] } } ] }, "vendor_name": "" } ] } }, "credit": "Mi\u0161ko Hevery", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "3.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/angular/angular/issues/40136", "refsource": "MISC", "url": "https://github.com/angular/angular/issues/40136" }, { "name": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09", "refsource": "MISC", "url": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09" }, { "name": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902", "refsource": "MISC", "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902" }, { "name": "https://vuldb.com/?id.181356", "refsource": "MISC", "url": "https://vuldb.com/?id.181356" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2021-4231", "datePublished": "2022-05-26T07:10:14", "dateReserved": "2022-05-26T00:00:00", "dateUpdated": "2024-08-03T17:23:10.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-4231\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2022-05-26T14:15:07.953\",\"lastModified\":\"2024-11-21T06:37:11.870\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad en Angular versiones hasta 11.0.4/11.1.0-next.2. Ha sido clasificada como problem\u00e1tica. Est\u00e1 afectada la manipulaci\u00f3n de los comentarios. La manipulaci\u00f3n conlleva a un ataque de tipo cross site scripting. Es posible lanzar el ataque de forma remota, pero podr\u00eda requerir una autenticaci\u00f3n previa. La actualizaci\u00f3n a versiones 11.0.5 y 11.1.0-next.3 puede abordar este problema. El nombre del parche es ba8da742e3b243e8f43d4c63aa842b44e14f2b09. Es recomendado actualizar el componente afectado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"11.0.5\",\"matchCriteriaId\":\"5A6D9CF5-C960-47FC-B102-0C03D7B36E29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:angular:angular:11.1.0:next_0:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"1D56DDCF-45E8-4B74-A2EC-67993A8BB983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:angular:angular:11.1.0:next_1:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"8F53A2ED-9AC4-43C7-AEC8-39CD29CC5C97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:angular:angular:11.1.0:next_2:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"9875CC1E-1DAD-455B-BD9C-C0DEF12E962E\"}]}]}],\"references\":[{\"url\":\"https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/angular/angular/issues/40136\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?id.181356\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/angular/angular/issues/40136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?id.181356\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
wid-sec-w-2023-1542
Vulnerability from csaf_certbund
Published
2023-06-22 22:00
Modified
2024-05-21 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1542 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json" }, { "category": "self", "summary": "WID-SEC-2023-1542 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0139" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0143" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0121" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14", "url": "https://access.redhat.com/errata/RHSA-2023:7820" }, { "category": "external", "summary": "Meinberg Security Advisory", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3742" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23", "url": "https://access.redhat.com/errata/RHSA-2023:3614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3615" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27", "url": "https://access.redhat.com/errata/RHSA-2023:3613" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3918" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3910" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3915" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3925" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10", "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4025" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4112" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4113" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4114" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4053" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4204" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4090" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4241" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4238" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4093" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4091" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4225" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03", "url": "https://access.redhat.com/errata/RHSA-2023:4470" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4335" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23", "url": "https://access.redhat.com/errata/RHSA-2023:4674" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4983" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5103" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5233" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20", "url": "https://access.redhat.com/errata/RHSA-2023:5314" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6316" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15", "url": "https://access.redhat.com/errata/RHSA-2023:7058" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05", "url": "https://access.redhat.com/errata/RHSA-2023:7823" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21", "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06", "url": "https://access.redhat.com/errata/RHSA-2023:7672" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04", "url": "https://security.gentoo.org/glsa/202405-04" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2987" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3254" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T12:11:49.378+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1542", "initial_release_date": "2023-06-22T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-05T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-03T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-23T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-05T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-12T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-19T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-20T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-14T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-12-03T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-12-06T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-13T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-04T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "32" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.08.007", "product": { "name": "Meinberg LANTIME \u003c7.08.007", "product_id": "T032435", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:7.08.007" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Advanced Cluster Security for Kubernetes 4", "product": { "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4", "product_id": "T027916", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4" } } }, { "category": "product_version", "name": "Service Interconnect 1", "product": { "name": "Red Hat Enterprise Linux Service Interconnect 1", "product_id": "T028472", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version", "name": "Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "T026435", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.12" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.4", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.4", "product_id": "T028225", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.13.0", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.13.0", "product_id": "T028289", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.22", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.22", "product_id": "T028307", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.11.44", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.11.44", "product_id": "T028416", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.12.10", "product_id": "T031698", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.0", "product_id": "T031839", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.46", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.46", "product_id": "T031870", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2015-20107" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-16250", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16250" }, { "cve": "CVE-2020-16251", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16251" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4231" }, { "cve": "CVE-2021-4235", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4235" }, { "cve": "CVE-2021-4238", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4238" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43998", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43998" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44964", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44964" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0670", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-0670" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1348", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1348" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23540", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23540" }, { "cve": "CVE-2022-23541", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23541" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-26280", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-26280" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-28805", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-28805" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-33099", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-33099" }, { "cve": "CVE-2022-3358", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3358" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-3715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38149", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38149" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-41316", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41316" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41723", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41724", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41724" }, { "cve": "CVE-2022-41725", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41725" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-47024", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47024" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-48303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48338", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48338" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0361", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0620", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0620" }, { "cve": "CVE-2023-0665", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0665" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-2491", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-2491" }, { "cve": "CVE-2023-24999", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24999" }, { "cve": "CVE-2023-25000", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25000" }, { "cve": "CVE-2023-25136", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25136" } ] }
WID-SEC-W-2023-1542
Vulnerability from csaf_certbund
Published
2023-06-22 22:00
Modified
2024-05-21 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1542 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json" }, { "category": "self", "summary": "WID-SEC-2023-1542 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0139" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0143" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0121" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14", "url": "https://access.redhat.com/errata/RHSA-2023:7820" }, { "category": "external", "summary": "Meinberg Security Advisory", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3742" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23", "url": "https://access.redhat.com/errata/RHSA-2023:3614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3615" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27", "url": "https://access.redhat.com/errata/RHSA-2023:3613" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3918" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3910" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3915" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3925" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10", "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4025" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4112" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4113" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4114" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4053" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4204" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4090" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4241" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4238" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4093" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4091" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4225" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03", "url": "https://access.redhat.com/errata/RHSA-2023:4470" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4335" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23", "url": "https://access.redhat.com/errata/RHSA-2023:4674" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4983" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5103" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5233" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20", "url": "https://access.redhat.com/errata/RHSA-2023:5314" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6316" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15", "url": "https://access.redhat.com/errata/RHSA-2023:7058" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05", "url": "https://access.redhat.com/errata/RHSA-2023:7823" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21", "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06", "url": "https://access.redhat.com/errata/RHSA-2023:7672" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04", "url": "https://security.gentoo.org/glsa/202405-04" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2987" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3254" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T12:11:49.378+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1542", "initial_release_date": "2023-06-22T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-05T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-03T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-23T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-05T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-12T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-19T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-20T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-14T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-12-03T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-12-06T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-13T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-04T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "32" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.08.007", "product": { "name": "Meinberg LANTIME \u003c7.08.007", "product_id": "T032435", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:7.08.007" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Advanced Cluster Security for Kubernetes 4", "product": { "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4", "product_id": "T027916", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4" } } }, { "category": "product_version", "name": "Service Interconnect 1", "product": { "name": "Red Hat Enterprise Linux Service Interconnect 1", "product_id": "T028472", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version", "name": "Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "T026435", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.12" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.4", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.4", "product_id": "T028225", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.13.0", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.13.0", "product_id": "T028289", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.22", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.22", "product_id": "T028307", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.11.44", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.11.44", "product_id": "T028416", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.12.10", "product_id": "T031698", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.0", "product_id": "T031839", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.46", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.46", "product_id": "T031870", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2015-20107" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-16250", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16250" }, { "cve": "CVE-2020-16251", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16251" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4231" }, { "cve": "CVE-2021-4235", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4235" }, { "cve": "CVE-2021-4238", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4238" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43998", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43998" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44964", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44964" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0670", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-0670" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1348", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1348" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23540", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23540" }, { "cve": "CVE-2022-23541", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23541" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-26280", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-26280" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-28805", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-28805" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-33099", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-33099" }, { "cve": "CVE-2022-3358", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3358" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-3715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38149", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38149" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-41316", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41316" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41723", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41724", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41724" }, { "cve": "CVE-2022-41725", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41725" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-47024", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47024" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-48303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48338", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48338" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0361", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0620", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0620" }, { "cve": "CVE-2023-0665", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0665" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-2491", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-2491" }, { "cve": "CVE-2023-24999", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24999" }, { "cve": "CVE-2023-25000", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25000" }, { "cve": "CVE-2023-25136", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25136" } ] }
WID-SEC-W-2023-1489
Vulnerability from csaf_certbund
Published
2023-06-15 22:00
Modified
2023-06-15 22:00
Summary
Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und einen Denial of Service Zustand auszulösen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1489 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1489.json" }, { "category": "self", "summary": "WID-SEC-2023-1489 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1489" }, { "category": "external", "summary": "RHSA-2023:3623 - Security Advisory vom 2023-06-15", "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-15T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:31:37.760+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1489", "initial_release_date": "2023-06-15T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product": { "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product_id": "T028158", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:ceph_storage_6.1" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux Ceph Storage. Der Fehler besteht im Moment.js-Paket bei der \u00dcbergabe von vom Benutzer bereitgestellten Zeichenketten ohne \u00dcberpr\u00fcfung der korrekten L\u00e4nge an den Moment-Konstruktor. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux Ceph Storage existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden im angular/core Paket nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, authentisierter Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2021-4231" } ] }
wid-sec-w-2023-1489
Vulnerability from csaf_certbund
Published
2023-06-15 22:00
Modified
2023-06-15 22:00
Summary
Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und einen Denial of Service Zustand auszulösen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1489 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1489.json" }, { "category": "self", "summary": "WID-SEC-2023-1489 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1489" }, { "category": "external", "summary": "RHSA-2023:3623 - Security Advisory vom 2023-06-15", "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-15T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:31:37.760+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1489", "initial_release_date": "2023-06-15T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product": { "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product_id": "T028158", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:ceph_storage_6.1" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux Ceph Storage. Der Fehler besteht im Moment.js-Paket bei der \u00dcbergabe von vom Benutzer bereitgestellten Zeichenketten ohne \u00dcberpr\u00fcfung der korrekten L\u00e4nge an den Moment-Konstruktor. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux Ceph Storage existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden im angular/core Paket nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, authentisierter Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2021-4231" } ] }
rhsa-2023_3623
Vulnerability from csaf_redhat
Published
2023-06-15 09:19
Modified
2024-12-18 00:38
Summary
Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security and bug fix update
Notes
Topic
New packages for Red Hat Ceph Storage 6.1 are now available on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
These new packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the
most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index
Security Fix(es):
* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
* angular: XSS vulnerability (CVE-2021-4231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All users of Red Hat Ceph Storage are advised to update to these packages that provide numerous enhancements and bug fixes.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New packages for Red Hat Ceph Storage 6.1 are now available on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThese new packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the\nmost significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* angular: XSS vulnerability (CVE-2021-4231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll users of Red Hat Ceph Storage are advised to update to these packages that provide numerous enhancements and bug fixes.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3623", "url": "https://access.redhat.com/errata/RHSA-2023:3623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index" }, { "category": "external", "summary": "1467648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1467648" }, { "category": "external", "summary": "1600995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600995" }, { "category": "external", "summary": "1783271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783271" }, { "category": "external", "summary": "1794550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1794550" }, { "category": "external", "summary": "1929760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929760" }, { "category": "external", "summary": "1932764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932764" }, { "category": "external", "summary": "1937618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937618" }, { "category": "external", "summary": "1975689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975689" }, { "category": "external", "summary": "1991808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991808" }, { "category": "external", "summary": "2004175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004175" }, { "category": "external", "summary": "2016288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016288" }, { "category": "external", "summary": "2016949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016949" }, { "category": "external", "summary": "2024444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024444" }, { "category": "external", "summary": "2025815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025815" }, { "category": "external", "summary": "2028058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028058" }, { "category": "external", "summary": "2029714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029714" }, { "category": "external", "summary": "2036063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036063" }, { "category": "external", "summary": "2053347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053347" }, { "category": "external", "summary": "2053471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053471" }, { "category": "external", "summary": "2064260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064260" }, { "category": "external", "summary": "2064265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064265" }, { "category": "external", "summary": "2067709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067709" }, { "category": "external", "summary": "2076709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076709" }, { "category": "external", "summary": "2080926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080926" }, { "category": "external", "summary": "2082666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082666" }, { "category": "external", "summary": "2092506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092506" }, { "category": "external", "summary": "2094052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094052" }, { "category": "external", "summary": "2097027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097027" }, { "category": "external", "summary": "2097187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097187" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2105950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105950" }, { "category": "external", "summary": "2106421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106421" }, { "category": "external", "summary": "2108228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108228" }, { "category": "external", "summary": "2108489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108489" }, { "category": "external", "summary": "2109224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109224" }, { "category": "external", "summary": "2110290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110290" }, { "category": "external", "summary": "2111282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111282" }, { "category": "external", "summary": "2111364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111364" }, { "category": "external", "summary": "2111680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111680" }, { "category": "external", "summary": "2111751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111751" }, { "category": "external", "summary": "2112309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112309" }, { "category": "external", "summary": "2114835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114835" }, { "category": "external", "summary": "2120624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120624" }, { "category": "external", "summary": "2124441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124441" }, { "category": "external", "summary": "2127345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127345" }, { "category": "external", "summary": "2127926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127926" }, { "category": "external", "summary": "2129861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129861" }, { "category": "external", "summary": "2132554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132554" }, { "category": "external", "summary": "2133341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133341" }, { "category": "external", "summary": "2133549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133549" }, { "category": "external", "summary": "2133802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133802" }, { "category": "external", "summary": "2136031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136031" }, { "category": "external", "summary": "2136304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136304" }, { "category": "external", "summary": "2136336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136336" }, { "category": "external", "summary": "2137596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137596" }, { "category": "external", "summary": "2138793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138793" }, { "category": "external", "summary": "2138794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138794" }, { "category": "external", "summary": "2138933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138933" }, { "category": "external", "summary": "2139694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139694" }, { "category": "external", "summary": "2139769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139769" }, { "category": "external", "summary": "2140074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140074" }, { "category": "external", "summary": "2140784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140784" }, { "category": "external", "summary": "2141110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141110" }, { "category": "external", "summary": "2142167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142167" }, { "category": "external", "summary": "2142431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142431" }, { "category": "external", "summary": "2143285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143285" }, { "category": "external", "summary": "2145104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145104" }, { "category": "external", "summary": "2146544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2146544" }, { "category": "external", "summary": "2146546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2146546" }, { "category": "external", "summary": "2147346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147346" }, { "category": "external", "summary": "2147348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147348" }, { "category": "external", "summary": "2149259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149259" }, { "category": "external", "summary": "2149415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149415" }, { "category": "external", "summary": "2149533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149533" }, { "category": "external", "summary": "2151189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151189" }, { "category": "external", "summary": "2152963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152963" }, { "category": "external", "summary": "2153196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153196" }, { "category": "external", "summary": "2153452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153452" }, { "category": "external", "summary": "2153533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153533" }, { "category": "external", "summary": "2153673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153673" }, { "category": "external", "summary": "2153726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153726" }, { "category": "external", "summary": "2158689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158689" }, { "category": "external", "summary": "2159294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159294" }, { "category": "external", "summary": "2159307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159307" }, { "category": "external", "summary": "2160598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160598" }, { "category": "external", "summary": "2161479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161479" }, { "category": "external", "summary": "2161483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161483" }, { "category": "external", "summary": "2163473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163473" }, { "category": "external", "summary": "2164327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164327" }, { "category": "external", "summary": "2168541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168541" }, { "category": "external", "summary": "2172791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172791" }, { "category": "external", "summary": "2175307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175307" }, { "category": "external", "summary": "2180110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180110" }, { "category": "external", "summary": "2180567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180567" }, { "category": "external", "summary": "2181055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181055" }, { "category": "external", "summary": "2182022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182022" }, { "category": "external", "summary": "2182035", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182035" }, { "category": "external", "summary": "2182564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182564" }, { "category": "external", "summary": "2182613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182613" }, { "category": "external", "summary": "2184268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184268" }, { "category": "external", "summary": "2185588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185588" }, { "category": "external", "summary": "2185772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185772" }, { "category": "external", "summary": "2186095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186095" }, { "category": "external", "summary": "2186126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186126" }, { "category": "external", "summary": "2186472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186472" }, { "category": "external", "summary": "2186557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186557" }, { "category": "external", "summary": "2186738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186738" }, { "category": "external", "summary": "2186760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186760" }, { "category": "external", "summary": "2186774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186774" }, { "category": "external", "summary": "2187265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187265" }, { "category": "external", "summary": "2187394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187394" }, { "category": "external", "summary": "2187617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187617" }, { "category": "external", "summary": "2187659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187659" }, { "category": "external", "summary": "2188266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188266" }, { "category": "external", "summary": "2188460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188460" }, { "category": "external", "summary": "2189308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189308" }, { "category": "external", "summary": "2190412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2190412" }, { "category": "external", "summary": "2196421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196421" }, { "category": "external", "summary": "2196920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196920" }, { "category": "external", "summary": "2203098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203098" }, { "category": "external", "summary": "2203160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203160" }, { "category": "external", "summary": "2203747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203747" }, { "category": "external", "summary": "2204479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2204479" }, { "category": "external", "summary": "2207702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207702" }, { "category": "external", "summary": "2207718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207718" }, { "category": "external", "summary": "2209109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209109" }, { "category": "external", "summary": "2209300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209300" }, { "category": "external", "summary": "2209375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209375" }, { "category": "external", "summary": "2209970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209970" }, { "category": "external", "summary": "2210698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210698" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3623.json" } ], "title": "Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security and bug fix update", "tracking": { "current_release_date": "2024-12-18T00:38:54+00:00", "generator": { "date": "2024-12-18T00:38:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3623", "initial_release_date": "2023-06-15T09:19:13+00:00", "revision_history": [ { "date": "2023-06-15T09:19:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-06-15T09:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:38:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ceph Storage 6.1 Tools", "product": { "name": "Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:6.1::el9" } } } ], "category": "product_family", "name": "Red Hat Ceph Storage" }, { "branches": [ { "category": "product_version", "name": "cephadm-ansible-0:2.15.0-1.el9cp.src", "product": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.src", "product_id": "cephadm-ansible-0:2.15.0-1.el9cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephadm-ansible@2.15.0-1.el9cp?arch=src" } } }, { "category": "product_version", "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "product": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "product_id": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-collection-ansible-posix@1.2.0-1.3.el9ost?arch=src" } } }, { "category": "product_version", "name": "ceph-2:17.2.6-70.el9cp.src", "product": { "name": "ceph-2:17.2.6-70.el9cp.src", "product_id": "ceph-2:17.2.6-70.el9cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph@17.2.6-70.el9cp?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "product": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "product_id": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephadm-ansible@2.15.0-1.el9cp?arch=noarch" } } }, { "category": "product_version", "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "product": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "product_id": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-collection-ansible-posix@1.2.0-1.3.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "ceph-mib-2:17.2.6-70.el9cp.noarch", "product": { "name": "ceph-mib-2:17.2.6-70.el9cp.noarch", "product_id": "ceph-mib-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mib@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "product": { "name": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "product_id": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-resource-agents@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "cephadm-2:17.2.6-70.el9cp.noarch", "product": { "name": "cephadm-2:17.2.6-70.el9cp.noarch", "product_id": "cephadm-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephadm@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-top-2:17.2.6-70.el9cp.noarch", "product": { "name": "cephfs-top-2:17.2.6-70.el9cp.noarch", "product_id": "cephfs-top-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-top@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ceph-base-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-base-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-base-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-common-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-common-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "librados-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados2-2:17.2.6-70.el9cp.x86_64", "product_id": "librados2-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "product_id": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librbd1-2:17.2.6-70.el9cp.x86_64", "product_id": "librbd1-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librgw2-2:17.2.6-70.el9cp.x86_64", "product_id": "librgw2-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-common@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rados-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rados-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-exporter-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-mirror-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephsqlite-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados2-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados2-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "product_id": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librbd1-2:17.2.6-70.el9cp.ppc64le", "product_id": "librbd1-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librgw2-2:17.2.6-70.el9cp.ppc64le", "product_id": "librgw2-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-common@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-exporter-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-mirror-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephsqlite-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ceph-base-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-base-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-base-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-common-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-common-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "product_id": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephfs2-2:17.2.6-70.el9cp.s390x", "product_id": "libcephfs2-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados-devel-2:17.2.6-70.el9cp.s390x", "product_id": "librados-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados2-2:17.2.6-70.el9cp.s390x", "product_id": "librados2-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "product_id": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "product": { "name": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "product_id": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "librbd-devel-2:17.2.6-70.el9cp.s390x", "product_id": "librbd-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:17.2.6-70.el9cp.s390x", "product": { "name": "librbd1-2:17.2.6-70.el9cp.s390x", "product_id": "librbd1-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "librgw-devel-2:17.2.6-70.el9cp.s390x", "product_id": "librgw-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:17.2.6-70.el9cp.s390x", "product": { "name": "librgw2-2:17.2.6-70.el9cp.s390x", "product_id": "librgw2-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "product_id": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "product_id": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-common@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "product_id": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rados-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rados-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rbd-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rbd-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rgw-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rgw-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-exporter-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-mirror-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephsqlite-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch" }, "product_reference": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src" }, "product_reference": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-2:17.2.6-70.el9cp.src as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src" }, "product_reference": "ceph-2:17.2.6-70.el9cp.src", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-base-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-base-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-common-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-common-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mib-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch" }, "product_reference": "ceph-mib-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch" }, "product_reference": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephadm-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch" }, "product_reference": "cephadm-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch" }, "product_reference": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.src as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" }, "product_reference": "cephadm-ansible-0:2.15.0-1.el9cp.src", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-top-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch" }, "product_reference": "cephfs-top-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephfs2-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados2-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados2-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados2-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librbd-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librbd1-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librbd1-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librbd1-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librgw-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librgw2-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librgw2-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librgw2-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rados-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rados-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rbd-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rgw-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-4231", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2022-05-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094052" } ], "notes": [ { "category": "description", "text": "A flaw was found in the angular/core package. Affected versions of this package are vulnerable to Cross-site scripting (XSS) in development, with Server-side rendering (SSR enabled).", "title": "Vulnerability description" }, { "category": "summary", "text": "angular: XSS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0, therefore it will not be addressed in this version of dotnet. For more information, please see https://access.redhat.com/support/policy/updates/net-core.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4231" }, { "category": "external", "summary": "RHBZ#2094052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4231", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4231" } ], "release_date": "2020-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T09:19:13+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage cluster using cephadm in the Red Hat Storage Ceph Upgrade Guide (https://access.redhat.com/documentation/en-us/red_hat_ceph_storage).", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "angular: XSS vulnerability" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T09:19:13+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage cluster using cephadm in the Red Hat Storage Ceph Upgrade Guide (https://access.redhat.com/documentation/en-us/red_hat_ceph_storage).", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
ghsa-c75v-2vq8-878f
Vulnerability from github
Published
2022-05-27 00:01
Modified
2023-10-10 19:57
Severity ?
Summary
Cross site scripting in Angular
Details
A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 10.2.5, 11.0.5 or 11.1.0-next.3 is advised to to address this issue.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "@angular/core" }, "ranges": [ { "events": [ { "introduced": "11.0.0" }, { "fixed": "11.0.5" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 11.1.0-next.2" }, "package": { "ecosystem": "npm", "name": "@angular/core" }, "ranges": [ { "events": [ { "introduced": "11.1.0-next.0" }, { "fixed": "11.1.0-next.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "@angular/core" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "10.2.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-4231" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2022-06-02T18:58:52Z", "nvd_published_at": "2022-05-26T14:15:00Z", "severity": "MODERATE" }, "details": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 10.2.5, 11.0.5 or 11.1.0-next.3 is advised to to address this issue.", "id": "GHSA-c75v-2vq8-878f", "modified": "2023-10-10T19:57:50Z", "published": "2022-05-27T00:01:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4231" }, { "type": "WEB", "url": "https://github.com/angular/angular/issues/40136" }, { "type": "WEB", "url": "https://github.com/angular/angular/commit/0aa220bc0000fc4d1651ec388975bbf5baa1da36" }, { "type": "WEB", "url": "https://github.com/angular/angular/commit/47d9b6d72dab9d60c96bc1c3604219f6385649ea" }, { "type": "WEB", "url": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09" }, { "type": "PACKAGE", "url": "https://github.com/angular/angular" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902" }, { "type": "WEB", "url": "https://vuldb.com/?id.181356" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Cross site scripting in Angular" }
gsd-2021-4231
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-4231", "description": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component.", "id": "GSD-2021-4231" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-4231" ], "details": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component.", "id": "GSD-2021-4231", "modified": "2023-12-13T01:23:11.449478Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2021-4231", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Angular Comment cross site scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Angular", "version": { "version_data": [ { "version_value": "11.0.0" }, { "version_value": "11.0.1" }, { "version_value": "11.0.2" }, { "version_value": "11.0.3" }, { "version_value": "11.0.4" }, { "version_value": "11.1.0-next.0" }, { "version_value": "11.1.0-next.1" }, { "version_value": "11.1.0-next.2" } ] } } ] }, "vendor_name": "" } ] } }, "credit": "Mi\u0161ko Hevery", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "3.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/angular/angular/issues/40136", "refsource": "MISC", "url": "https://github.com/angular/angular/issues/40136" }, { "name": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09", "refsource": "MISC", "url": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09" }, { "name": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902", "refsource": "MISC", "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902" }, { "name": "https://vuldb.com/?id.181356", "refsource": "MISC", "url": "https://vuldb.com/?id.181356" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c11.0.5||\u003e=11.1.0-next.0 \u003c=11.1.0-next.2", "affected_versions": "All versions before 11.0.5, all versions starting from 11.1.0-next.0 up to 11.1.0-next.2", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-06-02", "description": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component.", "fixed_versions": [ "11.0.5", "11.1.0-next.3" ], "identifier": "CVE-2021-4231", "identifiers": [ "GHSA-c75v-2vq8-878f", "CVE-2021-4231" ], "not_impacted": "All versions starting from 11.0.5 before 11.1.0-next.0, all versions after 11.1.0-next.2", "package_slug": "npm/@angular/core", "pubdate": "2022-05-27", "solution": "Upgrade to versions 11.0.5, 11.1.0-next.3 or above.", "title": "Cross site scripting in Angular", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-4231", "https://github.com/angular/angular/issues/40136", "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09", "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902", "https://vuldb.com/?id.181356", "https://github.com/advisories/GHSA-c75v-2vq8-878f" ], "uuid": "6a45597e-2d35-486f-9901-a58784c425af" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:angular:angular:11.1.0:next_1:*:*:*:node.js:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:angular:angular:11.1.0:next_2:*:*:*:node.js:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:angular:angular:11.1.0:next_0:*:*:*:node.js:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "11.0.5", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2021-4231" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://vuldb.com/?id.181356", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.181356" }, { "name": "https://github.com/angular/angular/issues/40136", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/angular/angular/issues/40136" }, { "name": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902" }, { "name": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7 } }, "lastModifiedDate": "2022-06-07T19:07Z", "publishedDate": "2022-05-26T14:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.